Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.100.45.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64526
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.100.45.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011800 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 18 23:49:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 150.45.100.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 150.45.100.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.56.79.2 attackbots
2019-09-29T18:23:24.3853601495-001 sshd\[52120\]: Failed password for invalid user quincy from 103.56.79.2 port 39848 ssh2
2019-09-29T18:35:57.7310081495-001 sshd\[53101\]: Invalid user marie from 103.56.79.2 port 35393
2019-09-29T18:35:57.7340761495-001 sshd\[53101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.79.2
2019-09-29T18:35:59.7141431495-001 sshd\[53101\]: Failed password for invalid user marie from 103.56.79.2 port 35393 ssh2
2019-09-29T18:39:16.9181751495-001 sshd\[53309\]: Invalid user ying from 103.56.79.2 port 36744
2019-09-29T18:39:16.9211461495-001 sshd\[53309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.56.79.2
...
2019-09-30 06:51:20
213.74.203.106 attackspambots
Sep 29 13:04:36 hiderm sshd\[19258\]: Invalid user ac from 213.74.203.106
Sep 29 13:04:36 hiderm sshd\[19258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.74.203.106
Sep 29 13:04:38 hiderm sshd\[19258\]: Failed password for invalid user ac from 213.74.203.106 port 34976 ssh2
Sep 29 13:09:26 hiderm sshd\[19793\]: Invalid user umesh from 213.74.203.106
Sep 29 13:09:26 hiderm sshd\[19793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.74.203.106
2019-09-30 07:15:47
157.230.153.75 attackspam
2019-09-29T21:53:05.636026abusebot-3.cloudsearch.cf sshd\[19778\]: Invalid user na from 157.230.153.75 port 43277
2019-09-30 07:08:05
189.112.109.189 attack
2019-09-29T22:32:46.504469abusebot-2.cloudsearch.cf sshd\[13267\]: Invalid user bv from 189.112.109.189 port 52837
2019-09-30 06:44:06
108.60.228.19 attack
firewall-block, port(s): 23/tcp
2019-09-30 07:11:44
211.239.121.27 attack
Sep 30 01:34:10 pkdns2 sshd\[2127\]: Invalid user 1qaz2wsx from 211.239.121.27Sep 30 01:34:12 pkdns2 sshd\[2127\]: Failed password for invalid user 1qaz2wsx from 211.239.121.27 port 42434 ssh2Sep 30 01:38:47 pkdns2 sshd\[2319\]: Invalid user replicator from 211.239.121.27Sep 30 01:38:50 pkdns2 sshd\[2319\]: Failed password for invalid user replicator from 211.239.121.27 port 55104 ssh2Sep 30 01:43:33 pkdns2 sshd\[2555\]: Invalid user bogdan from 211.239.121.27Sep 30 01:43:35 pkdns2 sshd\[2555\]: Failed password for invalid user bogdan from 211.239.121.27 port 39560 ssh2
...
2019-09-30 06:44:48
181.191.135.4 attackspam
23/tcp
[2019-09-29]1pkt
2019-09-30 06:39:21
202.169.46.82 attack
Sep 29 18:31:06 xtremcommunity sshd\[9533\]: Invalid user lt from 202.169.46.82 port 48426
Sep 29 18:31:06 xtremcommunity sshd\[9533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.82
Sep 29 18:31:08 xtremcommunity sshd\[9533\]: Failed password for invalid user lt from 202.169.46.82 port 48426 ssh2
Sep 29 18:36:58 xtremcommunity sshd\[9630\]: Invalid user foobar from 202.169.46.82 port 40377
Sep 29 18:36:58 xtremcommunity sshd\[9630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.169.46.82
...
2019-09-30 06:42:30
138.68.29.52 attackspambots
[ssh] SSH attack
2019-09-30 06:56:04
185.105.238.199 attackspam
Sep 30 01:42:32 www sshd\[34253\]: Invalid user yb from 185.105.238.199
Sep 30 01:42:32 www sshd\[34253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.105.238.199
Sep 30 01:42:33 www sshd\[34253\]: Failed password for invalid user yb from 185.105.238.199 port 42754 ssh2
...
2019-09-30 06:49:08
77.88.47.31 attackbots
port scan and connect, tcp 80 (http)
2019-09-30 06:39:51
211.75.194.80 attackspam
SSH Brute Force, server-1 sshd[9203]: Failed password for invalid user teamspeak3 from 211.75.194.80 port 50764 ssh2
2019-09-30 07:14:07
118.250.114.164 attackbotsspam
Sep2922:49:48server2pure-ftpd:\(\?@118.250.114.164\)[WARNING]Authenticationfailedforuser[borgocapitignano]Sep2922:49:55server2pure-ftpd:\(\?@118.250.114.164\)[WARNING]Authenticationfailedforuser[borgocapitignano]Sep2922:50:01server2pure-ftpd:\(\?@118.250.114.164\)[WARNING]Authenticationfailedforuser[borgocapitignano]Sep2922:50:05server2pure-ftpd:\(\?@118.250.114.164\)[WARNING]Authenticationfailedforuser[borgocapitignano]Sep2922:50:10server2pure-ftpd:\(\?@118.250.114.164\)[WARNING]Authenticationfailedforuser[borgocapitignano]
2019-09-30 07:11:15
54.39.138.246 attackspam
Sep 30 00:56:05 MK-Soft-VM6 sshd[23630]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.138.246 
Sep 30 00:56:07 MK-Soft-VM6 sshd[23630]: Failed password for invalid user usbmuxd from 54.39.138.246 port 50986 ssh2
...
2019-09-30 06:56:16
171.244.36.103 attack
Sep 29 12:44:25 friendsofhawaii sshd\[30932\]: Invalid user 123456 from 171.244.36.103
Sep 29 12:44:25 friendsofhawaii sshd\[30932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.36.103
Sep 29 12:44:27 friendsofhawaii sshd\[30932\]: Failed password for invalid user 123456 from 171.244.36.103 port 36380 ssh2
Sep 29 12:49:23 friendsofhawaii sshd\[31359\]: Invalid user charlie from 171.244.36.103
Sep 29 12:49:23 friendsofhawaii sshd\[31359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.36.103
2019-09-30 06:53:43

Recently Reported IPs

219.152.228.102 121.204.204.7 48.68.111.142 219.152.228.225
101.89.182.38 204.120.181.181 60.212.19.235 101.89.183.234
231.88.170.54 124.135.68.234 125.94.215.88 101.89.217.226
125.124.119.1 99.7.202.81 223.221.36.1 139.107.27.227
114.235.39.153 106.42.29.72 27.150.26.73 175.6.80.87