Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hanoi

Region: Hanoi

Country: Vietnam

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.114.106.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5705
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.114.106.73.			IN	A

;; AUTHORITY SECTION:
.			336	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022063001 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 01 12:21:25 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 73.106.114.42.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 42.114.106.73.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.234.219.246 attack
fell into ViewStateTrap:rome
2019-10-20 18:08:27
80.13.21.150 attackspambots
Unauthorised access (Oct 20) SRC=80.13.21.150 LEN=44 TOS=0x08 PREC=0x40 TTL=240 ID=54110 TCP DPT=139 WINDOW=1024 SYN
2019-10-20 18:12:47
190.2.156.118 attack
DATE:2019-10-20 05:47:27, IP:190.2.156.118, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-10-20 18:18:04
200.11.240.237 attackspam
2019-10-20T10:22:38.864278abusebot-5.cloudsearch.cf sshd\[19158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.11.240.237  user=root
2019-10-20 18:29:31
144.217.39.131 attackbotsspam
Oct 17 13:56:39 vayu sshd[44116]: Failed password for r.r from 144.217.39.131 port 44216 ssh2
Oct 17 13:56:39 vayu sshd[44116]: Received disconnect from 144.217.39.131: 11: Bye Bye [preauth]
Oct 17 14:09:04 vayu sshd[48517]: Failed password for r.r from 144.217.39.131 port 48924 ssh2
Oct 17 14:09:04 vayu sshd[48517]: Received disconnect from 144.217.39.131: 11: Bye Bye [preauth]
Oct 17 14:12:51 vayu sshd[49996]: Failed password for r.r from 144.217.39.131 port 34018 ssh2
Oct 17 14:12:51 vayu sshd[49996]: Received disconnect from 144.217.39.131: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=144.217.39.131
2019-10-20 18:20:48
206.81.8.14 attackbotsspam
Oct 20 11:57:20 localhost sshd\[25711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.8.14  user=root
Oct 20 11:57:23 localhost sshd\[25711\]: Failed password for root from 206.81.8.14 port 50398 ssh2
Oct 20 12:00:54 localhost sshd\[26092\]: Invalid user admin from 206.81.8.14 port 44324
2019-10-20 18:15:10
106.12.132.187 attackspambots
Invalid user cunningham from 106.12.132.187 port 56828
2019-10-20 18:21:27
185.40.13.212 attackspam
3389BruteforceFW21
2019-10-20 17:55:53
59.25.197.142 attack
2019-10-20T06:45:24.843521abusebot-5.cloudsearch.cf sshd\[16987\]: Invalid user bjorn from 59.25.197.142 port 59958
2019-10-20 18:06:37
175.124.43.123 attack
Oct 19 20:15:39 tdfoods sshd\[14774\]: Invalid user IL from 175.124.43.123
Oct 19 20:15:39 tdfoods sshd\[14774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.123
Oct 19 20:15:40 tdfoods sshd\[14774\]: Failed password for invalid user IL from 175.124.43.123 port 50991 ssh2
Oct 19 20:19:55 tdfoods sshd\[15121\]: Invalid user sen from 175.124.43.123
Oct 19 20:19:55 tdfoods sshd\[15121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.123
2019-10-20 18:24:44
65.32.78.171 attackbots
DATE:2019-10-20 05:36:09, IP:65.32.78.171, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc-bis)
2019-10-20 18:09:25
37.59.38.137 attackbots
Invalid user permakultur from 37.59.38.137 port 53678
2019-10-20 18:06:18
77.68.90.129 attack
Multiple failed RDP login attempts
2019-10-20 17:57:02
184.105.139.112 attackspambots
Honeypot hit.
2019-10-20 18:26:55
185.175.93.101 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 5938 proto: TCP cat: Misc Attack
2019-10-20 18:25:40

Recently Reported IPs

45.190.159.32 192.241.216.43 195.154.51.234 124.235.251.21
189.137.73.92 167.172.89.24 183.109.112.122 222.144.165.27
222.116.19.186 89.179.6.6 74.137.125.53 89.104.106.242
60.0.219.126 129.153.212.107 221.158.195.111 211.195.230.164
165.232.186.55 100.33.203.130 104.248.172.107 121.187.251.210