Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.209.119.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18551
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.209.119.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 02:54:07 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 21.119.209.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 21.119.209.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.27.118.163 attackbotsspam
Unauthorized connection attempt detected from IP address 59.27.118.163 to port 23
2020-07-23 02:44:32
177.153.19.130 attackspam
From bounce-35cd4d53be0cb40ec1d4b79cbb1257a1@smtplw-13.com Wed Jul 22 13:18:52 2020
Received: from smtp180t19f130.saaspmta0002.correio.biz ([177.153.19.130]:59683)
2020-07-23 03:13:15
114.7.162.198 attackspam
Jul 23 01:22:53 webhost01 sshd[18598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.7.162.198
Jul 23 01:22:56 webhost01 sshd[18598]: Failed password for invalid user postgres from 114.7.162.198 port 38928 ssh2
...
2020-07-23 02:43:45
179.188.7.100 attackbots
From bounce-35cd4d53be0cb40ec1d4b79cbb1257a1@smtplw-13.com Wed Jul 22 11:48:29 2020
Received: from smtp152t7f100.saaspmta0001.correio.biz ([179.188.7.100]:46034)
2020-07-23 03:00:24
95.141.18.213 attack
2020-07-22 09:44:55.819960-0500  localhost smtpd[61369]: NOQUEUE: reject: RCPT from unknown[95.141.18.213]: 450 4.7.25 Client host rejected: cannot find your hostname, [95.141.18.213]; from= to= proto=ESMTP helo=
2020-07-23 03:22:03
49.233.61.51 attackbotsspam
Jul 22 10:12:46 dignus sshd[31780]: Failed password for invalid user kay from 49.233.61.51 port 43976 ssh2
Jul 22 10:15:57 dignus sshd[32168]: Invalid user oracle from 49.233.61.51 port 53222
Jul 22 10:15:57 dignus sshd[32168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.61.51
Jul 22 10:15:59 dignus sshd[32168]: Failed password for invalid user oracle from 49.233.61.51 port 53222 ssh2
Jul 22 10:19:04 dignus sshd[32561]: Invalid user test from 49.233.61.51 port 34222
...
2020-07-23 02:45:27
54.36.109.237 attackbots
Unauthorized connection attempt detected from IP address 54.36.109.237 to port 8443
2020-07-23 03:21:31
129.211.130.66 attackbots
2020-07-22T19:26:04.546798ns386461 sshd\[6648\]: Invalid user nagios from 129.211.130.66 port 37644
2020-07-22T19:26:04.551156ns386461 sshd\[6648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.66
2020-07-22T19:26:06.951217ns386461 sshd\[6648\]: Failed password for invalid user nagios from 129.211.130.66 port 37644 ssh2
2020-07-22T19:31:14.365071ns386461 sshd\[11144\]: Invalid user administrador from 129.211.130.66 port 42094
2020-07-22T19:31:14.369498ns386461 sshd\[11144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.130.66
...
2020-07-23 02:45:02
61.177.172.168 attackbots
2020-07-22T20:49:08.491350vps751288.ovh.net sshd\[24599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.168  user=root
2020-07-22T20:49:10.775204vps751288.ovh.net sshd\[24599\]: Failed password for root from 61.177.172.168 port 40533 ssh2
2020-07-22T20:49:15.143125vps751288.ovh.net sshd\[24599\]: Failed password for root from 61.177.172.168 port 40533 ssh2
2020-07-22T20:49:17.753233vps751288.ovh.net sshd\[24599\]: Failed password for root from 61.177.172.168 port 40533 ssh2
2020-07-22T20:49:20.967596vps751288.ovh.net sshd\[24599\]: Failed password for root from 61.177.172.168 port 40533 ssh2
2020-07-23 02:56:02
218.253.69.134 attackspam
$f2bV_matches
2020-07-23 02:53:10
160.16.80.134 attack
2020-07-22T18:46:03.984788shield sshd\[20616\]: Invalid user joseluis from 160.16.80.134 port 54886
2020-07-22T18:46:03.995458shield sshd\[20616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tk2-216-17630.vs.sakura.ne.jp
2020-07-22T18:46:05.555038shield sshd\[20616\]: Failed password for invalid user joseluis from 160.16.80.134 port 54886 ssh2
2020-07-22T18:50:24.445280shield sshd\[21182\]: Invalid user user3 from 160.16.80.134 port 41276
2020-07-22T18:50:24.454226shield sshd\[21182\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=tk2-216-17630.vs.sakura.ne.jp
2020-07-23 03:07:18
43.226.147.239 attackbotsspam
Jul 22 20:17:00 server sshd[52353]: Failed password for invalid user zhangchi from 43.226.147.239 port 38358 ssh2
Jul 22 20:30:22 server sshd[57651]: Failed password for invalid user q from 43.226.147.239 port 40424 ssh2
Jul 22 20:35:29 server sshd[59465]: Failed password for invalid user user8 from 43.226.147.239 port 40774 ssh2
2020-07-23 03:24:43
14.63.174.149 attackbots
Jul 22 13:19:47 Tower sshd[43365]: Connection from 14.63.174.149 port 47884 on 192.168.10.220 port 22 rdomain ""
Jul 22 13:19:50 Tower sshd[43365]: Invalid user ubuntu from 14.63.174.149 port 47884
Jul 22 13:19:50 Tower sshd[43365]: error: Could not get shadow information for NOUSER
Jul 22 13:19:50 Tower sshd[43365]: Failed password for invalid user ubuntu from 14.63.174.149 port 47884 ssh2
Jul 22 13:19:50 Tower sshd[43365]: Received disconnect from 14.63.174.149 port 47884:11: Bye Bye [preauth]
Jul 22 13:19:50 Tower sshd[43365]: Disconnected from invalid user ubuntu 14.63.174.149 port 47884 [preauth]
2020-07-23 02:44:49
218.93.114.155 attack
2020-07-22 05:30:20 server sshd[86470]: Failed password for invalid user alderete from 218.93.114.155 port 63631 ssh2
2020-07-23 03:02:53
14.33.45.230 attackbotsspam
Jul 22 19:52:14 vm1 sshd[23931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.33.45.230
Jul 22 19:52:16 vm1 sshd[23931]: Failed password for invalid user test from 14.33.45.230 port 45330 ssh2
...
2020-07-23 03:22:26

Recently Reported IPs

89.246.43.94 140.168.40.170 15.69.178.197 218.151.109.175
43.231.81.71 228.78.204.148 194.181.80.143 156.3.115.208
215.167.88.105 20.178.82.241 152.135.122.65 114.121.170.173
194.185.75.165 233.78.5.231 48.42.32.94 234.174.251.90
255.148.105.127 154.180.224.76 132.49.77.32 46.94.58.122