Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.237.149.34
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.237.149.34.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020601 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 04:59:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
34.149.237.42.in-addr.arpa domain name pointer hn.kd.ny.adsl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
34.149.237.42.in-addr.arpa	name = hn.kd.ny.adsl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
12.28.50.210 attackspam
Lines containing failures of 12.28.50.210 (max 1000)
Apr 14 19:22:38 archiv sshd[5985]: Invalid user asecruc from 12.28.50.210 port 4308
Apr 14 19:22:38 archiv sshd[5985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.28.50.210
Apr 14 19:22:40 archiv sshd[5985]: Failed password for invalid user asecruc from 12.28.50.210 port 4308 ssh2
Apr 14 19:22:40 archiv sshd[5985]: Received disconnect from 12.28.50.210 port 4308:11: Bye Bye [preauth]
Apr 14 19:22:40 archiv sshd[5985]: Disconnected from 12.28.50.210 port 4308 [preauth]
Apr 14 19:41:48 archiv sshd[6362]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.28.50.210  user=r.r
Apr 14 19:41:50 archiv sshd[6362]: Failed password for r.r from 12.28.50.210 port 23586 ssh2
Apr 14 19:41:50 archiv sshd[6362]: Received disconnect from 12.28.50.210 port 23586:11: Bye Bye [preauth]
Apr 14 19:41:50 archiv sshd[6362]: Disconnected from 12.28.50.210 p........
------------------------------
2020-04-16 01:33:48
194.26.29.103 attackbotsspam
Apr 15 19:37:30 debian-2gb-nbg1-2 kernel: \[9231234.701366\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=194.26.29.103 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=242 ID=62263 PROTO=TCP SPT=52169 DPT=9790 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-16 01:41:31
183.89.215.38 attackspam
Dovecot Invalid User Login Attempt.
2020-04-16 01:52:25
61.216.2.79 attackspambots
Apr 15 19:56:20 debian-2gb-nbg1-2 kernel: \[9232365.048438\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=61.216.2.79 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=35787 PROTO=TCP SPT=47931 DPT=2665 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-16 02:11:20
2a01:4f8:200:31ed::2 attackbotsspam
xmlrpc attack
2020-04-16 01:55:10
54.38.42.63 attackspambots
SSH Brute-Forcing (server2)
2020-04-16 01:48:59
95.78.251.116 attackspambots
Apr 15 16:39:40 sigma sshd\[13298\]: Invalid user ykk from 95.78.251.116Apr 15 16:39:42 sigma sshd\[13298\]: Failed password for invalid user ykk from 95.78.251.116 port 42756 ssh2
...
2020-04-16 01:57:03
163.172.178.167 attack
$f2bV_matches
2020-04-16 02:01:43
82.196.15.195 attackspam
2020-04-15T19:11:55.862325librenms sshd[4406]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.196.15.195
2020-04-15T19:11:55.859977librenms sshd[4406]: Invalid user squid from 82.196.15.195 port 49654
2020-04-15T19:11:58.286457librenms sshd[4406]: Failed password for invalid user squid from 82.196.15.195 port 49654 ssh2
...
2020-04-16 02:03:08
37.26.86.178 attackbots
$f2bV_matches
2020-04-16 01:41:03
60.216.19.58 attack
Apr 15 19:40:58 [host] sshd[18296]: Invalid user g
Apr 15 19:40:58 [host] sshd[18296]: pam_unix(sshd:
Apr 15 19:41:00 [host] sshd[18296]: Failed passwor
2020-04-16 02:12:36
49.36.140.58 attack
C1,WP GET /wp-login.php
2020-04-16 01:45:41
66.249.155.245 attackspambots
SSH Brute-Force reported by Fail2Ban
2020-04-16 01:45:00
190.104.233.28 attack
Apr 15 14:07:37 nextcloud sshd\[3873\]: Invalid user grid from 190.104.233.28
Apr 15 14:07:37 nextcloud sshd\[3873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.233.28
Apr 15 14:07:39 nextcloud sshd\[3873\]: Failed password for invalid user grid from 190.104.233.28 port 42238 ssh2
2020-04-16 01:56:02
92.50.136.106 attackspambots
2020-04-15 16:28:50,889 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 92.50.136.106
2020-04-15 17:05:26,741 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 92.50.136.106
2020-04-15 17:41:55,084 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 92.50.136.106
2020-04-15 18:18:32,159 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 92.50.136.106
2020-04-15 18:54:47,683 fail2ban.actions        [22360]: NOTICE  [sshd] Ban 92.50.136.106
...
2020-04-16 01:43:33

Recently Reported IPs

233.168.36.181 34.139.97.88 92.184.100.131 143.223.75.146
93.89.11.19 66.255.223.206 98.194.3.200 231.31.213.194
59.251.65.168 180.223.125.44 131.213.24.145 254.207.186.153
14.79.96.240 238.221.183.219 197.219.216.94 173.210.154.173
8.32.243.13 186.217.233.106 191.150.37.121 83.84.96.189