Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.230.219.214
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45484
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.230.219.214.			IN	A

;; AUTHORITY SECTION:
.			488	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:43:47 CST 2022
;; MSG SIZE  rcvd: 107
Host info
214.219.230.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
214.219.230.42.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.65.186.232 attackbotsspam
445/tcp 445/tcp
[2020-10-04]2pkt
2020-10-05 22:55:23
95.243.136.198 attack
$f2bV_matches
2020-10-05 23:07:04
194.180.224.130 attackspambots
(sshd) Failed SSH login from 194.180.224.130 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  5 11:23:35 optimus sshd[24311]: Invalid user admin from 194.180.224.130
Oct  5 11:23:37 optimus sshd[24308]: Invalid user admin from 194.180.224.130
Oct  5 11:23:37 optimus sshd[24311]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.130 
Oct  5 11:23:37 optimus sshd[24310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.130  user=root
Oct  5 11:23:37 optimus sshd[24309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.180.224.130  user=root
2020-10-05 23:27:08
91.93.1.204 attackbots
445/tcp 445/tcp
[2020-10-04]2pkt
2020-10-05 22:59:38
39.74.247.207 attackbots
6881/udp
[2020-10-04]1pkt
2020-10-05 22:52:50
114.40.49.6 attackbotsspam
445/tcp
[2020-10-04]1pkt
2020-10-05 23:17:22
182.151.32.144 attackbotsspam
Fail2Ban Ban Triggered (2)
2020-10-05 23:08:54
111.230.157.219 attack
fail2ban: brute force SSH detected
2020-10-05 22:46:59
2.87.11.177 attackspam
honeypot 22 port
2020-10-05 23:22:43
220.158.162.143 attack
445/tcp 445/tcp 445/tcp
[2020-10-04]3pkt
2020-10-05 23:01:23
212.70.149.52 attack
Rude login attack (2456 tries in 1d)
2020-10-05 22:53:25
123.235.246.120 attack
37215/tcp 37215/tcp 37215/tcp
[2020-10-04]3pkt
2020-10-05 22:54:06
164.90.182.227 attackspambots
Oct  5 02:33:11 php1 sshd\[8474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.182.227  user=root
Oct  5 02:33:14 php1 sshd\[8474\]: Failed password for root from 164.90.182.227 port 47284 ssh2
Oct  5 02:36:58 php1 sshd\[8822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.182.227  user=root
Oct  5 02:37:00 php1 sshd\[8822\]: Failed password for root from 164.90.182.227 port 54360 ssh2
Oct  5 02:40:54 php1 sshd\[9272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.90.182.227  user=root
2020-10-05 23:10:17
111.22.215.116 attackbots
Found on   Alienvault    / proto=6  .  srcport=53104  .  dstport=1433  .     (3544)
2020-10-05 23:16:31
41.21.149.4 attack
445/tcp
[2020-10-04]1pkt
2020-10-05 22:47:45

Recently Reported IPs

42.230.33.173 42.230.55.113 42.230.70.172 42.230.89.67
42.230.94.4 42.230.93.115 42.230.22.145 42.230.98.138
42.230.98.233 42.230.99.200 42.230.91.191 42.231.124.90
42.231.11.207 42.231.125.118 42.231.200.5 42.231.125.178
42.231.253.73 42.231.215.174 42.231.69.169 42.231.76.114