Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.2.114.127 attackspam
Unauthorized connection attempt detected from IP address 42.2.114.127 to port 5555 [J]
2020-03-02 20:41:41
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.2.114.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22483
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.2.114.138.			IN	A

;; AUTHORITY SECTION:
.			246	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022091500 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 15 23:10:29 CST 2022
;; MSG SIZE  rcvd: 105
Host info
138.114.2.42.in-addr.arpa domain name pointer 42-2-114-138.static.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.114.2.42.in-addr.arpa	name = 42-2-114-138.static.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.143.220.37 attackbots
45.143.220.37 was recorded 5 times by 1 hosts attempting to connect to the following ports: 60604,65407,65404,65403,65409. Incident counter (4h, 24h, all-time): 5, 32, 97
2019-11-06 21:43:47
122.51.86.120 attack
Nov  6 10:54:11 vps691689 sshd[1095]: Failed password for root from 122.51.86.120 port 51308 ssh2
Nov  6 10:58:50 vps691689 sshd[1191]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.86.120
...
2019-11-06 21:53:15
119.39.47.27 attackspambots
119.39.47.27 was recorded 5 times by 1 hosts attempting to connect to the following ports: 80,8080,443. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-06 21:47:02
211.244.224.130 attackbots
failed_logins
2019-11-06 21:32:00
185.31.162.109 attack
SIPVicious Scanner Detection, PTR: www.bnm.ed.
2019-11-06 21:38:33
217.61.59.73 attackbots
SIPVicious Scanner Detection, PTR: host73-59-61-217.serverdedicati.aruba.it.
2019-11-06 21:45:14
157.245.135.74 attackspam
Wordpress Admin Login attack
2019-11-06 21:26:59
89.164.233.75 attack
Port scan on 1 port(s): 9527
2019-11-06 21:35:21
119.39.46.123 attackspambots
port scan and connect, tcp 443 (https)
2019-11-06 21:34:43
51.15.51.2 attackbots
detected by Fail2Ban
2019-11-06 21:32:51
66.85.133.144 attackspam
SIPVicious Scanner Detection, PTR: nc-ph-0421-14.web-hosting.com.
2019-11-06 21:40:37
77.247.110.60 attackspam
SIPVicious Scanner Detection, PTR: PTR record not found
2019-11-06 21:50:13
157.245.235.139 attack
Apache Struts Content-Type Remote Code Execution Vulnerability CVE-2017-5638, PTR: PTR record not found
2019-11-06 21:26:41
45.148.10.62 attackspambots
Password spraying hacking attempt via VPN
2019-11-06 21:46:36
175.138.108.78 attack
Nov  5 23:45:21 web9 sshd\[30765\]: Invalid user frappe from 175.138.108.78
Nov  5 23:45:21 web9 sshd\[30765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.108.78
Nov  5 23:45:23 web9 sshd\[30765\]: Failed password for invalid user frappe from 175.138.108.78 port 48103 ssh2
Nov  5 23:50:19 web9 sshd\[31411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.108.78  user=root
Nov  5 23:50:21 web9 sshd\[31411\]: Failed password for root from 175.138.108.78 port 39229 ssh2
2019-11-06 21:37:39

Recently Reported IPs

164.77.38.161 104.144.165.51 212.175.35.98 223.240.209.33
43.138.107.180 23.107.176.105 220.200.35.98 114.224.129.141
186.93.144.104 168.119.119.45 64.43.89.4 13.126.90.100
64.43.89.229 64.43.89.82 13.127.188.147 46.107.82.175
185.61.24.113 45.130.60.184 180.165.229.148 202.21.105.115