Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yaizu

Region: Shizuoka

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.125.240.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.125.240.21.			IN	A

;; AUTHORITY SECTION:
.			399	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 07:49:16 CST 2023
;; MSG SIZE  rcvd: 106
Host info
b'Host 21.240.125.42.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 42.125.240.21.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
222.186.31.144 attackbotsspam
$f2bV_matches
2019-09-12 16:45:21
167.99.146.154 attack
Sep 12 09:20:04 h2177944 sshd\[21564\]: Invalid user suporte from 167.99.146.154 port 35432
Sep 12 09:20:05 h2177944 sshd\[21564\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.146.154
Sep 12 09:20:06 h2177944 sshd\[21564\]: Failed password for invalid user suporte from 167.99.146.154 port 35432 ssh2
Sep 12 09:26:28 h2177944 sshd\[21715\]: Invalid user testuser from 167.99.146.154 port 42910
...
2019-09-12 16:32:43
117.93.16.43 attack
Sep 12 06:54:40 www sshd\[8325\]: Invalid user admin from 117.93.16.43
Sep 12 06:54:40 www sshd\[8325\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.93.16.43
Sep 12 06:54:41 www sshd\[8325\]: Failed password for invalid user admin from 117.93.16.43 port 3886 ssh2
...
2019-09-12 16:29:22
89.254.209.69 attack
Sep 12 05:54:10 rpi sshd[11576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.254.209.69 
Sep 12 05:54:12 rpi sshd[11576]: Failed password for invalid user admin from 89.254.209.69 port 46770 ssh2
2019-09-12 16:51:15
176.221.8.202 attack
SMB Server BruteForce Attack
2019-09-12 16:52:22
66.225.195.138 attack
Honeypot attack, port: 445, PTR: 66-225-195-138-host.colocrossing.com.
2019-09-12 16:17:26
46.209.215.18 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-12 02:52:19,714 INFO [amun_request_handler] PortScan Detected on Port: 445 (46.209.215.18)
2019-09-12 16:07:34
187.116.110.54 attack
Sep 12 03:32:52 ny01 sshd[16010]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.116.110.54
Sep 12 03:32:54 ny01 sshd[16010]: Failed password for invalid user admin from 187.116.110.54 port 55693 ssh2
Sep 12 03:40:26 ny01 sshd[17569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.116.110.54
2019-09-12 16:15:58
73.59.165.164 attack
ssh brute force
2019-09-12 16:37:31
42.200.208.158 attackbotsspam
Sep 12 03:54:55 MK-Soft-VM5 sshd\[12401\]: Invalid user user5 from 42.200.208.158 port 42294
Sep 12 03:54:55 MK-Soft-VM5 sshd\[12401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.200.208.158
Sep 12 03:54:56 MK-Soft-VM5 sshd\[12401\]: Failed password for invalid user user5 from 42.200.208.158 port 42294 ssh2
...
2019-09-12 16:17:58
106.105.138.149 attackbotsspam
Honeypot attack, port: 5555, PTR: 106.105.138.149.adsl.dynamic.seed.net.tw.
2019-09-12 16:39:55
49.81.39.120 attackbotsspam
Brute force SMTP login attempts.
2019-09-12 16:31:34
191.31.0.29 attackbots
Sep 12 07:30:48 MK-Soft-VM7 sshd\[5474\]: Invalid user nagios from 191.31.0.29 port 5701
Sep 12 07:30:48 MK-Soft-VM7 sshd\[5474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.31.0.29
Sep 12 07:30:50 MK-Soft-VM7 sshd\[5474\]: Failed password for invalid user nagios from 191.31.0.29 port 5701 ssh2
...
2019-09-12 16:24:13
77.40.61.122 attack
2019-09-12T01:14:53.587295MailD postfix/smtpd[17498]: warning: unknown[77.40.61.122]: SASL LOGIN authentication failed: authentication failure
2019-09-12T04:04:38.562487MailD postfix/smtpd[29220]: warning: unknown[77.40.61.122]: SASL LOGIN authentication failed: authentication failure
2019-09-12T05:54:58.666929MailD postfix/smtpd[4693]: warning: unknown[77.40.61.122]: SASL LOGIN authentication failed: authentication failure
2019-09-12 16:16:56
81.30.212.14 attack
Sep 12 09:53:21 xeon sshd[30964]: Failed password for invalid user upload from 81.30.212.14 port 51460 ssh2
2019-09-12 16:24:42

Recently Reported IPs

131.142.79.221 7.94.44.131 82.3.8.5 154.3.184.5
62.12.135.3 49.25.114.6 96.39.112.140 11.55.29.196
99.20.72.20 183.89.7.28 106.97.24.6 251.79.199.126
55.230.197.64 15.95.56.157 79.35.32.99 4.208.238.224
179.198.0.40 43.207.203.164 98.78.73.39 116.190.55.24