Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.234.172.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37947
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.234.172.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 03:59:09 CST 2025
;; MSG SIZE  rcvd: 107
Host info
149.172.234.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.172.234.42.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.231.245.17 attackspam
Jun 27 08:31:01 vps200512 sshd\[27230\]: Invalid user xun from 185.231.245.17
Jun 27 08:31:01 vps200512 sshd\[27230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.231.245.17
Jun 27 08:31:03 vps200512 sshd\[27230\]: Failed password for invalid user xun from 185.231.245.17 port 59102 ssh2
Jun 27 08:33:47 vps200512 sshd\[27252\]: Invalid user transition from 185.231.245.17
Jun 27 08:33:47 vps200512 sshd\[27252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.231.245.17
2019-06-27 20:36:16
189.38.1.44 attack
SSH invalid-user multiple login try
2019-06-27 20:58:03
188.166.231.47 attack
2019-06-27T13:10:42.095978abusebot-3.cloudsearch.cf sshd\[31412\]: Invalid user vdo from 188.166.231.47 port 45102
2019-06-27 21:11:51
156.212.92.99 attackbotsspam
Jun 27 06:34:32 srv-4 sshd\[29946\]: Invalid user admin from 156.212.92.99
Jun 27 06:34:32 srv-4 sshd\[29946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.212.92.99
Jun 27 06:34:35 srv-4 sshd\[29946\]: Failed password for invalid user admin from 156.212.92.99 port 39156 ssh2
...
2019-06-27 21:12:14
189.254.94.227 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 03:58:41,399 INFO [shellcode_manager] (189.254.94.227) no match, writing hexdump (db893507930b649974f924669c7bcc0b :2427419) - MS17010 (EternalBlue)
2019-06-27 20:54:34
103.248.83.76 attackspam
2019-06-27T07:24:43.318385abusebot-8.cloudsearch.cf sshd\[25968\]: Invalid user mysql from 103.248.83.76 port 35106
2019-06-27 20:38:18
218.173.235.222 attack
37215/tcp
[2019-06-27]1pkt
2019-06-27 21:17:38
195.175.63.126 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 03:58:49,791 INFO [shellcode_manager] (195.175.63.126) no match, writing hexdump (aec0906ca589d7b70ade454de23430b0 :2129281) - MS17010 (EternalBlue)
2019-06-27 20:42:11
79.110.206.27 attackbotsspam
SMTP
2019-06-27 20:32:41
132.232.32.54 attackspam
Jun 27 13:11:17 localhost sshd\[4161\]: Invalid user ubuntu from 132.232.32.54 port 50606
Jun 27 13:11:17 localhost sshd\[4161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.32.54
Jun 27 13:11:19 localhost sshd\[4161\]: Failed password for invalid user ubuntu from 132.232.32.54 port 50606 ssh2
...
2019-06-27 21:22:24
113.194.141.70 attackspam
Jun 27 06:34:38 srv-4 sshd\[29952\]: Invalid user admin from 113.194.141.70
Jun 27 06:34:38 srv-4 sshd\[29952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.194.141.70
Jun 27 06:34:40 srv-4 sshd\[29952\]: Failed password for invalid user admin from 113.194.141.70 port 51084 ssh2
...
2019-06-27 21:09:55
61.94.111.11 attackspambots
$f2bV_matches
2019-06-27 20:44:05
113.173.177.164 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-27 12:57:56,059 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.173.177.164)
2019-06-27 21:19:11
223.27.234.253 attackbots
Jun 27 07:57:47 Tower sshd[15755]: Connection from 223.27.234.253 port 48184 on 192.168.10.220 port 22
Jun 27 07:57:48 Tower sshd[15755]: Failed password for root from 223.27.234.253 port 48184 ssh2
Jun 27 07:57:49 Tower sshd[15755]: Received disconnect from 223.27.234.253 port 48184:11: Normal Shutdown, Thank you for playing [preauth]
Jun 27 07:57:49 Tower sshd[15755]: Disconnected from authenticating user root 223.27.234.253 port 48184 [preauth]
2019-06-27 20:54:09
36.80.74.83 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-26 03:59:13,786 INFO [shellcode_manager] (36.80.74.83) no match, writing hexdump (85cffe9a6ef3c3256119145b187a1a6a :1853294) - SMB (Unknown)
2019-06-27 20:30:34

Recently Reported IPs

12.230.12.234 6.116.30.123 68.44.18.142 222.225.120.171
193.0.90.242 230.177.125.97 108.110.131.29 219.22.235.252
244.238.22.151 27.185.100.53 19.232.92.66 48.113.147.51
154.236.2.185 53.22.242.155 206.19.132.136 128.105.165.108
254.166.125.11 142.149.168.238 58.66.2.72 160.183.189.253