Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.149.64.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.149.64.43.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 17:11:47 CST 2025
;; MSG SIZE  rcvd: 105
Host info
43.64.149.42.in-addr.arpa domain name pointer 42-149-64-43.rev.home.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
43.64.149.42.in-addr.arpa	name = 42-149-64-43.rev.home.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
212.64.35.193 attackbots
" "
2020-09-27 21:36:40
218.87.149.136 attack
 TCP (SYN) 218.87.149.136:50229 -> port 1433, len 40
2020-09-27 20:58:26
154.12.162.63 attackbotsspam
(From information@evergreenfamilychiropractic.com) ATT: evergreenfamilychiropractic.com / Chiropractor in Mauldin, SC :: Family Chiropractic :: Pediatric Chiropractic :: Pregnancy Chiropractic :: Dr Carolyn Longacre  WEB SITE SERVICES
This notification RUNS OUT ON: Sep 26, 2020


We have not obtained a settlement from you.
We  have actually tried to call you yet were unable to contact you.


Kindly Visit: https://bit.ly/3mQVaon .

For information and to process a optional payment for services.



09262020144228.
2020-09-27 21:35:31
91.214.114.7 attackspam
leo_www
2020-09-27 21:05:30
123.31.27.102 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-27 21:19:08
27.7.110.71 attack
IP 27.7.110.71 attacked honeypot on port: 23 at 9/26/2020 7:59:16 PM
2020-09-27 21:36:15
178.62.69.110 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-27 21:26:55
49.233.11.118 attackbots
Sep 27 12:02:26 prox sshd[24713]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.11.118 
Sep 27 12:02:29 prox sshd[24713]: Failed password for invalid user ubuntu from 49.233.11.118 port 47214 ssh2
2020-09-27 21:20:47
138.255.148.35 attack
Ssh brute force
2020-09-27 20:57:39
157.245.108.35 attackbots
Sep 27 09:03:55 hell sshd[16995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.108.35
Sep 27 09:03:57 hell sshd[16995]: Failed password for invalid user user from 157.245.108.35 port 36802 ssh2
...
2020-09-27 21:18:34
136.49.109.217 attackbotsspam
2020-09-27T12:42:42+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-09-27 21:32:24
119.40.37.126 attackbots
SSH Brute Force
2020-09-27 21:10:55
37.187.174.55 attackspam
37.187.174.55 - - [27/Sep/2020:11:47:07 +0200] "POST /wp-login.php HTTP/1.0" 200 4794 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-27 21:22:04
103.145.13.43 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 50802 5038 resulting in total of 23 scans from 103.145.13.0/24 block.
2020-09-27 21:03:56
192.241.220.248 attackspambots
TCP ports : 139 / 4200
2020-09-27 21:25:06

Recently Reported IPs

74.129.93.161 62.105.52.88 185.76.25.54 96.197.111.41
175.157.201.245 114.12.100.119 199.149.32.10 68.64.180.61
204.180.38.202 254.227.207.164 59.29.215.224 76.39.221.99
195.87.25.62 83.135.6.84 151.148.221.96 48.48.12.198
66.218.67.251 139.60.65.65 128.126.219.66 39.99.88.100