Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.227.245.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.227.245.149.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020701 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 01:36:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
149.245.227.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.245.227.42.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
200.98.129.114 attackbotsspam
SSH Brute Force
2020-10-12 16:29:07
36.66.48.187 attackbots
SSH Brute-Force Attack
2020-10-12 16:50:12
152.136.165.226 attack
Brute-force attempt banned
2020-10-12 17:02:09
210.101.91.154 attackbotsspam
210.101.91.154 (KR/South Korea/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 12 01:01:28 server2 sshd[31337]: Failed password for root from 210.101.91.154 port 56376 ssh2
Oct 12 00:59:53 server2 sshd[30148]: Failed password for root from 49.232.202.58 port 56324 ssh2
Oct 12 01:00:20 server2 sshd[30704]: Failed password for root from 51.75.249.224 port 43766 ssh2
Oct 12 01:02:08 server2 sshd[31735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.213.60.30  user=root
Oct 12 01:01:26 server2 sshd[31337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.101.91.154  user=root

IP Addresses Blocked:
2020-10-12 16:32:06
153.156.71.130 attack
prod8
...
2020-10-12 17:03:10
179.104.162.203 attackbots
Port Scan detected!
...
2020-10-12 16:40:39
129.28.27.25 attackspam
Bruteforce detected by fail2ban
2020-10-12 16:34:40
115.226.130.100 attack
Continually trying to hack into our servers
2020-10-12 16:57:37
2803:9800:a883:81ba:9970:9d8e:596a:9417 attackbots
C1,WP GET /wp-login.php
2020-10-12 16:34:00
90.84.185.81 attack
Oct 12 03:35:17 sso sshd[18552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.84.185.81
Oct 12 03:35:19 sso sshd[18552]: Failed password for invalid user Gyongyver from 90.84.185.81 port 58674 ssh2
...
2020-10-12 16:47:02
78.157.200.184 attack
SSH Brute Force (V)
2020-10-12 16:24:29
49.235.133.228 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-12T05:24:26Z and 2020-10-12T05:34:38Z
2020-10-12 17:00:14
109.228.55.151 attackspam
Oct 12 10:28:28 santamaria sshd\[12651\]: Invalid user stevem from 109.228.55.151
Oct 12 10:28:28 santamaria sshd\[12651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.228.55.151
Oct 12 10:28:30 santamaria sshd\[12651\]: Failed password for invalid user stevem from 109.228.55.151 port 57522 ssh2
...
2020-10-12 16:51:27
85.93.20.134 attackspambots
[portscan] tcp/3389 [MS RDP]
*(RWIN=1024)(10120855)
2020-10-12 16:38:46
122.154.251.22 attackspambots
2020-10-12T03:08:27.140347server.mjenks.net sshd[489526]: Failed password for root from 122.154.251.22 port 48156 ssh2
2020-10-12T03:12:42.291316server.mjenks.net sshd[489830]: Invalid user raul from 122.154.251.22 port 57918
2020-10-12T03:12:42.296872server.mjenks.net sshd[489830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.154.251.22
2020-10-12T03:12:42.291316server.mjenks.net sshd[489830]: Invalid user raul from 122.154.251.22 port 57918
2020-10-12T03:12:44.620400server.mjenks.net sshd[489830]: Failed password for invalid user raul from 122.154.251.22 port 57918 ssh2
...
2020-10-12 16:30:34

Recently Reported IPs

1.54.210.156 94.25.180.104 51.241.51.167 220.250.10.90
103.159.128.58 27.43.178.14 27.47.126.86 103.235.153.154
3.81.208.93 125.89.145.74 182.124.118.81 107.174.141.186
5.13.156.184 183.98.253.31 198.199.106.66 116.16.102.255
125.43.21.51 61.227.242.3 125.228.136.237 115.48.131.43