Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.2.124.235 attack
Port Scan
2020-07-13 17:30:27
42.2.124.197 attackbots
Port 23 (Telnet) access denied
2020-05-01 02:11:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.2.124.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.2.124.196.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 16:20:26 CST 2025
;; MSG SIZE  rcvd: 105
Host info
196.124.2.42.in-addr.arpa domain name pointer 42-2-124-196.static.netvigator.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.124.2.42.in-addr.arpa	name = 42-2-124-196.static.netvigator.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.166.1.123 attackspambots
Aug 27 03:37:15 pornomens sshd\[7939\]: Invalid user edu from 188.166.1.123 port 39874
Aug 27 03:37:15 pornomens sshd\[7939\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.1.123
Aug 27 03:37:17 pornomens sshd\[7939\]: Failed password for invalid user edu from 188.166.1.123 port 39874 ssh2
...
2019-08-27 09:41:35
137.74.44.162 attackbotsspam
Aug 27 03:02:57 srv206 sshd[29784]: Invalid user werkstatt from 137.74.44.162
...
2019-08-27 10:07:33
98.143.148.45 attack
Aug 27 03:22:45 plex sshd[7898]: Invalid user admin1 from 98.143.148.45 port 40032
2019-08-27 09:46:22
165.22.143.139 attack
Aug 27 00:44:08 ns315508 sshd[3594]: Invalid user simple from 165.22.143.139 port 50418
Aug 27 00:44:08 ns315508 sshd[3594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.143.139
Aug 27 00:44:08 ns315508 sshd[3594]: Invalid user simple from 165.22.143.139 port 50418
Aug 27 00:44:11 ns315508 sshd[3594]: Failed password for invalid user simple from 165.22.143.139 port 50418 ssh2
Aug 27 00:48:07 ns315508 sshd[3618]: Invalid user andres from 165.22.143.139 port 38864
...
2019-08-27 09:56:15
122.195.200.148 attack
Aug 27 03:29:54 legacy sshd[4265]: Failed password for root from 122.195.200.148 port 54090 ssh2
Aug 27 03:30:05 legacy sshd[4271]: Failed password for root from 122.195.200.148 port 57532 ssh2
Aug 27 03:30:08 legacy sshd[4271]: Failed password for root from 122.195.200.148 port 57532 ssh2
...
2019-08-27 09:34:05
186.228.60.22 attackbotsspam
Aug 26 15:14:52 lcprod sshd\[27501\]: Invalid user admin from 186.228.60.22
Aug 26 15:14:52 lcprod sshd\[27501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.228.60.22
Aug 26 15:14:55 lcprod sshd\[27501\]: Failed password for invalid user admin from 186.228.60.22 port 54374 ssh2
Aug 26 15:19:56 lcprod sshd\[27944\]: Invalid user csgoserver from 186.228.60.22
Aug 26 15:19:56 lcprod sshd\[27944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.228.60.22
2019-08-27 09:32:33
186.209.74.108 attackspam
SSH bruteforce (Triggered fail2ban)
2019-08-27 09:31:41
200.69.70.30 attack
/wp-login.php
2019-08-27 09:31:23
62.210.30.128 attackspambots
2019-08-27T01:50:01.870053abusebot-3.cloudsearch.cf sshd\[22643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.30.128  user=root
2019-08-27 09:58:18
180.250.210.165 attackbotsspam
Aug 26 21:20:27 TORMINT sshd\[28975\]: Invalid user hugo from 180.250.210.165
Aug 26 21:20:27 TORMINT sshd\[28975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.210.165
Aug 26 21:20:29 TORMINT sshd\[28975\]: Failed password for invalid user hugo from 180.250.210.165 port 45829 ssh2
...
2019-08-27 09:35:13
179.217.118.237 attackspambots
firewall-block, port(s): 23/tcp
2019-08-27 10:02:15
142.93.198.86 attack
2019-08-21T20:51:56.615687wiz-ks3 sshd[21192]: Invalid user smmsp from 142.93.198.86 port 52896
2019-08-21T20:51:56.617680wiz-ks3 sshd[21192]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.86
2019-08-21T20:51:56.615687wiz-ks3 sshd[21192]: Invalid user smmsp from 142.93.198.86 port 52896
2019-08-21T20:51:58.655854wiz-ks3 sshd[21192]: Failed password for invalid user smmsp from 142.93.198.86 port 52896 ssh2
2019-08-21T20:56:27.924131wiz-ks3 sshd[21203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.86  user=root
2019-08-21T20:56:29.830900wiz-ks3 sshd[21203]: Failed password for root from 142.93.198.86 port 39968 ssh2
2019-08-21T21:01:20.613870wiz-ks3 sshd[21233]: Invalid user temp1 from 142.93.198.86 port 55254
2019-08-21T21:01:20.615887wiz-ks3 sshd[21233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.86
2019-08-21T21:01:20.613870wiz-ks3 sshd[21233]: Inv
2019-08-27 10:07:01
23.129.64.191 attackspambots
Aug 26 21:29:27 ny01 sshd[5840]: Failed password for sshd from 23.129.64.191 port 47926 ssh2
Aug 26 21:29:36 ny01 sshd[5840]: Failed password for sshd from 23.129.64.191 port 47926 ssh2
Aug 26 21:29:38 ny01 sshd[5840]: Failed password for sshd from 23.129.64.191 port 47926 ssh2
Aug 26 21:29:41 ny01 sshd[5840]: Failed password for sshd from 23.129.64.191 port 47926 ssh2
Aug 26 21:29:41 ny01 sshd[5840]: error: maximum authentication attempts exceeded for sshd from 23.129.64.191 port 47926 ssh2 [preauth]
2019-08-27 09:30:15
188.226.129.78 attackspam
scan z
2019-08-27 09:25:23
137.74.158.143 attackspam
WordPress wp-login brute force :: 137.74.158.143 0.044 BYPASS [27/Aug/2019:09:40:55  1000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 4479 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-08-27 09:46:03

Recently Reported IPs

253.123.91.55 81.30.77.66 143.251.38.232 161.103.14.235
57.71.216.122 233.234.124.153 251.61.233.32 84.135.50.101
217.247.37.132 248.58.94.180 127.41.225.11 31.129.45.124
15.80.68.172 154.210.100.63 60.149.223.167 119.35.93.223
73.17.245.197 34.70.73.64 205.140.43.156 128.6.213.40