Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Central

Region: Central and Western District

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: HKT Limited

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.2.69.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15059
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.2.69.4.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040100 1800 900 604800 86400

;; Query time: 6 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Tue Apr 02 00:29:21 +08 2019
;; MSG SIZE  rcvd: 113

Host info
4.69.2.42.in-addr.arpa domain name pointer 42-2-69-004.static.netvigator.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
4.69.2.42.in-addr.arpa	name = 42-2-69-004.static.netvigator.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
61.222.56.80 attackbotsspam
Nov 24 15:37:13 vpxxxxxxx22308 sshd[8136]: Invalid user server from 61.222.56.80
Nov 24 15:37:13 vpxxxxxxx22308 sshd[8136]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.222.56.80
Nov 24 15:37:15 vpxxxxxxx22308 sshd[8136]: Failed password for invalid user server from 61.222.56.80 port 51244 ssh2
Nov 24 15:40:57 vpxxxxxxx22308 sshd[8679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.222.56.80  user=r.r
Nov 24 15:40:58 vpxxxxxxx22308 sshd[8679]: Failed password for r.r from 61.222.56.80 port 58608 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=61.222.56.80
2019-11-25 18:12:02
180.76.178.87 attack
11/25/2019-04:47:12.439286 180.76.178.87 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-25 17:58:42
180.76.100.183 attackbotsspam
Nov 25 07:05:09 xxxxxxx0 sshd[4243]: Invalid user perla from 180.76.100.183 port 42190
Nov 25 07:05:09 xxxxxxx0 sshd[4243]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.100.183
Nov 25 07:05:11 xxxxxxx0 sshd[4243]: Failed password for invalid user perla from 180.76.100.183 port 42190 ssh2
Nov 25 07:42:33 xxxxxxx0 sshd[9362]: Invalid user ardine from 180.76.100.183 port 57130
Nov 25 07:42:33 xxxxxxx0 sshd[9362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.100.183

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=180.76.100.183
2019-11-25 17:59:04
139.59.56.121 attackbotsspam
Nov 25 09:03:16 thevastnessof sshd[27437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.56.121
...
2019-11-25 18:05:56
167.71.215.72 attackbots
Nov 25 09:54:06 web8 sshd\[8163\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.215.72  user=mysql
Nov 25 09:54:09 web8 sshd\[8163\]: Failed password for mysql from 167.71.215.72 port 10358 ssh2
Nov 25 09:57:47 web8 sshd\[9988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.215.72  user=mysql
Nov 25 09:57:49 web8 sshd\[9988\]: Failed password for mysql from 167.71.215.72 port 25985 ssh2
Nov 25 10:01:29 web8 sshd\[11737\]: Invalid user tangene from 167.71.215.72
2019-11-25 18:12:48
106.13.201.142 attackbots
Nov 25 06:44:46 riskplan-s sshd[24341]: Invalid user leth from 106.13.201.142
Nov 25 06:44:46 riskplan-s sshd[24341]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.201.142 
Nov 25 06:44:47 riskplan-s sshd[24341]: Failed password for invalid user leth from 106.13.201.142 port 38430 ssh2
Nov 25 06:44:48 riskplan-s sshd[24341]: Received disconnect from 106.13.201.142: 11: Bye Bye [preauth]
Nov 25 07:04:54 riskplan-s sshd[24483]: Invalid user asterisk from 106.13.201.142
Nov 25 07:04:54 riskplan-s sshd[24483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.201.142 
Nov 25 07:04:56 riskplan-s sshd[24483]: Failed password for invalid user asterisk from 106.13.201.142 port 58446 ssh2
Nov 25 07:04:57 riskplan-s sshd[24483]: Received disconnect from 106.13.201.142: 11: Bye Bye [preauth]
Nov 25 07:09:33 riskplan-s sshd[24527]: Invalid user tubate from 106.13.201.142
Nov 25 07:09:33 ri........
-------------------------------
2019-11-25 18:06:25
191.5.83.0 attackspambots
Automatic report - Port Scan Attack
2019-11-25 18:23:03
14.21.7.162 attackbots
Nov 25 05:27:08 lvpxxxxxxx88-92-201-20 sshd[11916]: Failed password for invalid user rpc from 14.21.7.162 port 9411 ssh2
Nov 25 05:27:08 lvpxxxxxxx88-92-201-20 sshd[11916]: Received disconnect from 14.21.7.162: 11: Bye Bye [preauth]
Nov 25 05:44:19 lvpxxxxxxx88-92-201-20 sshd[12214]: Failed password for invalid user torrealba from 14.21.7.162 port 9412 ssh2
Nov 25 05:44:19 lvpxxxxxxx88-92-201-20 sshd[12214]: Received disconnect from 14.21.7.162: 11: Bye Bye [preauth]
Nov 25 05:49:10 lvpxxxxxxx88-92-201-20 sshd[12286]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.21.7.162  user=mail
Nov 25 05:49:12 lvpxxxxxxx88-92-201-20 sshd[12286]: Failed password for mail from 14.21.7.162 port 9414 ssh2
Nov 25 05:49:12 lvpxxxxxxx88-92-201-20 sshd[12286]: Received disconnect from 14.21.7.162: 11: Bye Bye [preauth]
Nov 25 05:53:55 lvpxxxxxxx88-92-201-20 sshd[12372]: Failed password for invalid user smmsp from 14.21.7.162 port 9416 ssh2
Nov 2........
-------------------------------
2019-11-25 18:00:39
40.92.64.78 attackbots
X-Original-Sender: ruthgriergr@hotmail.com
2019-11-25 17:57:41
192.99.28.247 attackbots
F2B jail: sshd. Time: 2019-11-25 10:30:34, Reported by: VKReport
2019-11-25 17:48:40
141.226.11.26 attackspambots
141.226.11.26 was recorded 5 times by 1 hosts attempting to connect to the following ports: 51413. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-25 18:13:38
94.23.2.40 attackbotsspam
Automatic report - XMLRPC Attack
2019-11-25 18:08:59
119.29.15.120 attackbotsspam
Nov 25 04:29:22 linuxvps sshd\[63236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.15.120  user=root
Nov 25 04:29:25 linuxvps sshd\[63236\]: Failed password for root from 119.29.15.120 port 39068 ssh2
Nov 25 04:36:33 linuxvps sshd\[2387\]: Invalid user 12 from 119.29.15.120
Nov 25 04:36:33 linuxvps sshd\[2387\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.15.120
Nov 25 04:36:35 linuxvps sshd\[2387\]: Failed password for invalid user 12 from 119.29.15.120 port 55787 ssh2
2019-11-25 17:52:10
103.15.226.108 attack
Nov 25 10:06:13 server sshd\[22313\]: Invalid user ekubeselassie from 103.15.226.108
Nov 25 10:06:13 server sshd\[22313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.15.226.108 
Nov 25 10:06:15 server sshd\[22313\]: Failed password for invalid user ekubeselassie from 103.15.226.108 port 45680 ssh2
Nov 25 10:20:13 server sshd\[26898\]: Invalid user danielb from 103.15.226.108
Nov 25 10:20:13 server sshd\[26898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.15.226.108 
...
2019-11-25 18:22:04
209.17.97.90 attackspam
209.17.97.90 was recorded 6 times by 6 hosts attempting to connect to the following ports: 138,8333,389,2484,2161. Incident counter (4h, 24h, all-time): 6, 35, 739
2019-11-25 17:59:42

Recently Reported IPs

60.250.53.30 218.92.0.197 36.96.187.119 14.241.123.12
181.112.216.244 175.197.74.182 40.138.144.172 80.211.252.112
160.28.60.12 77.79.241.34 212.156.93.202 45.235.204.129
36.74.75.31 197.53.129.80 84.216.200.177 51.38.37.69
1.55.200.102 139.199.105.82 24.191.126.212 211.56.251.226