Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seoul

Region: Seoul

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.14.130.162
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.14.130.162.			IN	A

;; AUTHORITY SECTION:
.			314	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100200 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 02 23:37:52 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 162.130.14.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 162.130.14.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
76.116.232.137 attackspam
scan z
2020-05-29 04:44:32
51.77.220.127 attackbotsspam
51.77.220.127 - - [29/May/2020:00:37:49 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-05-29 04:40:03
49.233.170.202 attackspam
May 28 22:21:55 localhost sshd\[2280\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.170.202  user=root
May 28 22:21:57 localhost sshd\[2280\]: Failed password for root from 49.233.170.202 port 37966 ssh2
May 28 22:24:55 localhost sshd\[2410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.170.202  user=root
May 28 22:24:57 localhost sshd\[2410\]: Failed password for root from 49.233.170.202 port 42488 ssh2
May 28 22:27:49 localhost sshd\[2826\]: Invalid user macko from 49.233.170.202
May 28 22:27:49 localhost sshd\[2826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.170.202
...
2020-05-29 04:43:04
116.132.47.50 attackbots
May 28 22:04:41 melroy-server sshd[16467]: Failed password for root from 116.132.47.50 port 34094 ssh2
...
2020-05-29 04:47:30
139.155.20.146 attackspambots
May 28 22:51:07 vps687878 sshd\[18676\]: Failed password for root from 139.155.20.146 port 36364 ssh2
May 28 22:54:32 vps687878 sshd\[18975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.20.146  user=root
May 28 22:54:34 vps687878 sshd\[18975\]: Failed password for root from 139.155.20.146 port 46174 ssh2
May 28 22:57:58 vps687878 sshd\[19409\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.20.146  user=root
May 28 22:58:00 vps687878 sshd\[19409\]: Failed password for root from 139.155.20.146 port 55988 ssh2
...
2020-05-29 05:06:04
119.96.118.78 attackbotsspam
no
2020-05-29 04:53:10
115.78.11.157 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-29 04:34:52
125.212.217.214 attackspam
Unauthorized connection attempt detected from IP address 125.212.217.214 to port 7171 [T]
2020-05-29 05:05:02
112.85.42.181 attackbotsspam
May 28 20:29:06 localhost sshd[63044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
May 28 20:29:08 localhost sshd[63044]: Failed password for root from 112.85.42.181 port 47495 ssh2
May 28 20:29:10 localhost sshd[63044]: Failed password for root from 112.85.42.181 port 47495 ssh2
May 28 20:29:06 localhost sshd[63044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
May 28 20:29:08 localhost sshd[63044]: Failed password for root from 112.85.42.181 port 47495 ssh2
May 28 20:29:10 localhost sshd[63044]: Failed password for root from 112.85.42.181 port 47495 ssh2
May 28 20:29:06 localhost sshd[63044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.181  user=root
May 28 20:29:08 localhost sshd[63044]: Failed password for root from 112.85.42.181 port 47495 ssh2
May 28 20:29:10 localhost sshd[63044]: Failed pas
...
2020-05-29 04:29:30
87.246.7.66 attack
2020-05-28T14:58:43.398149linuxbox-skyline auth[123259]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=fish rhost=87.246.7.66
...
2020-05-29 05:05:53
142.44.212.118 attackspambots
May 28 22:09:33 vpn01 sshd[22775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.212.118
May 28 22:09:35 vpn01 sshd[22775]: Failed password for invalid user noreply from 142.44.212.118 port 35664 ssh2
...
2020-05-29 04:49:29
46.189.207.15 attack
20/5/28@16:09:31: FAIL: IoT-SSH address from=46.189.207.15
...
2020-05-29 04:53:57
179.184.15.88 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-05-29 04:41:32
183.89.212.196 attackbots
(imapd) Failed IMAP login from 183.89.212.196 (TH/Thailand/mx-ll-183.89.212-196.dynamic.3bb.co.th): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 29 00:39:46 ir1 dovecot[2885757]: imap-login: Disconnected (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=183.89.212.196, lip=5.63.12.44, TLS: Connection closed, session=
2020-05-29 04:31:23
177.126.252.10 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-29 04:55:30

Recently Reported IPs

203.201.16.117 136.180.153.76 123.219.130.115 99.148.40.234
114.128.61.102 36.241.9.16 94.214.113.89 158.183.139.111
132.82.150.143 174.235.185.246 49.255.62.6 141.190.130.67
69.159.150.60 47.31.108.40 204.11.83.83 69.37.140.189
103.152.213.158 74.48.5.170 175.247.253.40 210.115.38.228