Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.158.105.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30285
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.158.105.149.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 15:36:39 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 149.105.158.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.105.158.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.76.103.27 attackspambots
Invalid user nsk from 180.76.103.27 port 43684
2020-05-24 00:37:27
51.75.25.12 attackspambots
May 23 11:01:06 XXXXXX sshd[3013]: Invalid user gtn from 51.75.25.12 port 38266
2020-05-24 00:28:53
36.133.109.12 attackbotsspam
Invalid user akshay from 36.133.109.12 port 55926
2020-05-24 00:49:45
173.161.70.37 attackspam
k+ssh-bruteforce
2020-05-24 00:56:46
175.6.140.14 attackspam
May 23 16:15:29 ns382633 sshd\[25441\]: Invalid user ocb from 175.6.140.14 port 37194
May 23 16:15:29 ns382633 sshd\[25441\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.140.14
May 23 16:15:31 ns382633 sshd\[25441\]: Failed password for invalid user ocb from 175.6.140.14 port 37194 ssh2
May 23 16:30:45 ns382633 sshd\[28035\]: Invalid user cclj from 175.6.140.14 port 57248
May 23 16:30:45 ns382633 sshd\[28035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.6.140.14
2020-05-24 00:38:53
180.218.95.171 attack
Invalid user admin from 180.218.95.171 port 56624
2020-05-24 00:55:15
159.65.41.159 attackspambots
SSH brute-force: detected 7 distinct usernames within a 24-hour window.
2020-05-24 00:58:44
46.218.7.227 attackbotsspam
May 23 13:03:19 ny01 sshd[8413]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227
May 23 13:03:21 ny01 sshd[8413]: Failed password for invalid user woj from 46.218.7.227 port 42510 ssh2
May 23 13:08:12 ny01 sshd[8962]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.218.7.227
2020-05-24 01:10:38
120.192.21.84 attackspam
SSH auth scanning - multiple failed logins
2020-05-24 01:02:00
60.174.248.244 attackspambots
Invalid user fhb from 60.174.248.244 port 46176
2020-05-24 01:08:03
104.224.147.72 attackspam
May 21 06:46:39 mout sshd[4373]: Invalid user ggz from 104.224.147.72 port 47452
May 21 06:46:41 mout sshd[4373]: Failed password for invalid user ggz from 104.224.147.72 port 47452 ssh2
May 23 16:59:08 mout sshd[23654]: Invalid user otp from 104.224.147.72 port 45836
2020-05-24 00:45:26
66.42.102.227 attack
xmlrpc attack
2020-05-24 00:31:13
113.253.225.251 attackspam
Invalid user osmc from 113.253.225.251 port 38831
2020-05-24 01:03:05
47.30.160.129 attackbotsspam
Invalid user tech from 47.30.160.129 port 51334
2020-05-24 01:10:07
51.15.87.74 attackbots
May 23 16:51:01 ip-172-31-61-156 sshd[2086]: Failed password for invalid user mjr from 51.15.87.74 port 39844 ssh2
May 23 16:50:59 ip-172-31-61-156 sshd[2086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.87.74
May 23 16:50:59 ip-172-31-61-156 sshd[2086]: Invalid user mjr from 51.15.87.74
May 23 16:51:01 ip-172-31-61-156 sshd[2086]: Failed password for invalid user mjr from 51.15.87.74 port 39844 ssh2
May 23 16:54:23 ip-172-31-61-156 sshd[2308]: Invalid user oza from 51.15.87.74
...
2020-05-24 01:09:40

Recently Reported IPs

162.53.196.173 79.13.204.248 248.203.160.88 94.24.211.0
172.45.2.199 216.78.217.185 149.34.95.245 192.129.126.74
15.161.23.170 231.2.149.189 209.173.149.254 41.136.174.129
195.96.234.118 248.6.1.170 251.71.142.21 248.92.100.205
67.144.170.97 155.170.18.168 80.10.151.240 250.180.195.193