Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Beijing

Region: Beijing

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.158.104.187
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20272
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.158.104.187.			IN	A

;; AUTHORITY SECTION:
.			174	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080200 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Aug 02 22:26:30 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 187.104.158.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 187.104.158.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.27.39.94 attack
SSH Brute-Force reported by Fail2Ban
2020-06-19 20:45:55
178.159.37.153 attack
Automatic report - Banned IP Access
2020-06-19 20:50:54
45.227.253.147 attackspambots
1 attempts against mh-modsecurity-ban on milky
2020-06-19 20:43:43
104.248.134.212 attack
Jun 19 14:11:46 vps687878 sshd\[9962\]: Failed password for invalid user deploy from 104.248.134.212 port 52238 ssh2
Jun 19 14:14:38 vps687878 sshd\[10185\]: Invalid user njs from 104.248.134.212 port 49676
Jun 19 14:14:38 vps687878 sshd\[10185\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.134.212
Jun 19 14:14:40 vps687878 sshd\[10185\]: Failed password for invalid user njs from 104.248.134.212 port 49676 ssh2
Jun 19 14:17:28 vps687878 sshd\[10511\]: Invalid user virtual from 104.248.134.212 port 47110
Jun 19 14:17:28 vps687878 sshd\[10511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.134.212
...
2020-06-19 20:25:13
185.39.11.57 attackbots
06/19/2020-08:21:50.440357 185.39.11.57 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-19 20:26:21
128.199.197.161 attackbotsspam
Jun 19 13:18:01 ajax sshd[13324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.197.161 
Jun 19 13:18:03 ajax sshd[13324]: Failed password for invalid user jobs from 128.199.197.161 port 33444 ssh2
2020-06-19 20:33:19
217.138.198.36 attackspambots
Chat Spam
2020-06-19 20:22:41
142.93.101.148 attack
...
2020-06-19 20:33:05
197.25.226.152 attack
1592569075 - 06/19/2020 14:17:55 Host: 197.25.226.152/197.25.226.152 Port: 445 TCP Blocked
2020-06-19 20:38:26
80.82.64.106 attack
80.82.64.106 was recorded 5 times by 5 hosts attempting to connect to the following ports: 123. Incident counter (4h, 24h, all-time): 5, 6, 18
2020-06-19 20:21:22
46.38.150.203 attackbotsspam
2020-06-19 12:43:16 auth_plain authenticator failed for (User) [46.38.150.203]: 535 Incorrect authentication data (set_id=haruko@csmailer.org)
2020-06-19 12:43:57 auth_plain authenticator failed for (User) [46.38.150.203]: 535 Incorrect authentication data (set_id=abcde@csmailer.org)
2020-06-19 12:44:43 auth_plain authenticator failed for (User) [46.38.150.203]: 535 Incorrect authentication data (set_id=fanclub@csmailer.org)
2020-06-19 12:45:23 auth_plain authenticator failed for (User) [46.38.150.203]: 535 Incorrect authentication data (set_id=admins@csmailer.org)
2020-06-19 12:46:09 auth_plain authenticator failed for (User) [46.38.150.203]: 535 Incorrect authentication data (set_id=flags@csmailer.org)
...
2020-06-19 20:45:00
181.137.180.244 attack
Automatic report - Port Scan Attack
2020-06-19 20:44:02
183.135.152.24 attackbots
spam (f2b h1)
2020-06-19 20:36:59
220.161.81.131 attack
Jun 19 14:14:46 eventyay sshd[14070]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.161.81.131
Jun 19 14:14:49 eventyay sshd[14070]: Failed password for invalid user venkat from 220.161.81.131 port 58788 ssh2
Jun 19 14:18:02 eventyay sshd[14199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.161.81.131
...
2020-06-19 20:32:30
157.230.132.100 attackspambots
Jun 19 14:14:06 home sshd[24977]: Failed password for root from 157.230.132.100 port 43288 ssh2
Jun 19 14:16:02 home sshd[25169]: Failed password for root from 157.230.132.100 port 45998 ssh2
...
2020-06-19 20:39:43

Recently Reported IPs

2.186.112.16 178.80.129.180 96.44.108.102 191.232.236.62
246.241.81.206 184.154.130.123 78.142.20.122 214.67.232.146
145.42.81.147 198.52.125.205 117.180.171.2 153.70.241.54
37.153.173.136 186.190.100.163 206.205.66.69 160.95.184.52
144.185.153.205 39.194.4.254 144.172.91.177 213.196.144.134