Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.116.106.68 attackspambots
Attempted connection to port 445.
2020-05-14 19:57:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.116.106.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26961
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.116.106.142.			IN	A

;; AUTHORITY SECTION:
.			162	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 17:30:18 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 142.106.116.42.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 142.106.116.42.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.155 attackspambots
Feb 17 19:29:15 ncomp sshd[27114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Feb 17 19:29:18 ncomp sshd[27114]: Failed password for root from 222.186.42.155 port 54594 ssh2
Feb 17 19:54:56 ncomp sshd[28522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.155  user=root
Feb 17 19:54:58 ncomp sshd[28522]: Failed password for root from 222.186.42.155 port 28590 ssh2
2020-02-18 02:00:42
213.45.73.167 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 01:52:37
213.5.132.126 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-18 01:32:36
213.141.131.22 attackspambots
Invalid user matthew from 213.141.131.22 port 55650
2020-02-18 02:15:52
49.234.47.124 attack
Feb 17 16:44:19 silence02 sshd[3334]: Failed password for root from 49.234.47.124 port 46590 ssh2
Feb 17 16:49:23 silence02 sshd[3609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.47.124
Feb 17 16:49:25 silence02 sshd[3609]: Failed password for invalid user test1 from 49.234.47.124 port 44524 ssh2
2020-02-18 02:13:02
113.1.40.8 attackspam
Automatic report - Port Scan
2020-02-18 01:42:59
185.202.2.66 attackspambots
RDP Brute-Force (honeypot 12)
2020-02-18 01:51:35
212.92.122.196 attackspam
RDPBruteCAu
2020-02-18 02:16:59
103.90.228.16 attackbots
20 attempts against mh_ha-misbehave-ban on oak
2020-02-18 01:43:51
222.142.51.127 attack
Automatic report - Port Scan
2020-02-18 02:07:11
117.202.61.10 attackbots
1581946585 - 02/17/2020 14:36:25 Host: 117.202.61.10/117.202.61.10 Port: 445 TCP Blocked
2020-02-18 01:44:42
83.111.151.245 attackbots
SSH Login Bruteforce
2020-02-18 01:41:49
179.124.36.196 attack
Invalid user marius from 179.124.36.196 port 51619
2020-02-18 01:52:15
43.243.128.213 attack
Feb 17 18:03:48 ks10 sshd[957031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.243.128.213 
Feb 17 18:03:50 ks10 sshd[957031]: Failed password for invalid user osmc from 43.243.128.213 port 56312 ssh2
...
2020-02-18 01:56:37
111.85.215.66 attackspam
Brute force attempt
2020-02-18 01:43:29

Recently Reported IPs

42.115.196.83 42.116.107.166 42.115.230.11 42.116.107.170
42.115.231.45 42.116.117.134 42.116.129.47 42.116.155.101
74.169.253.192 42.116.155.21 42.116.121.165 42.116.160.152
42.116.164.26 42.116.172.214 42.116.182.87 42.116.202.46
42.116.181.231 42.116.206.228 42.116.209.235 42.116.23.99