Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
42.245.203.153 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-05-26 07:54:52
42.245.203.139 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-23 22:23:13
42.245.203.136 attackbots
Port probing on unauthorized port 445
2020-02-14 09:53:22
42.245.203.148 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 14:30:01
42.245.203.148 attackspam
Unauthorized connection attempt detected from IP address 42.245.203.148 to port 4899 [J]
2020-01-06 14:26:40
42.245.203.134 attack
Port Scan: TCP/445
2019-08-24 14:32:30
42.245.203.139 attackbotsspam
19/7/22@19:26:43: FAIL: Alarm-Intrusion address from=42.245.203.139
...
2019-07-23 09:28:25
42.245.203.136 attackspam
19/7/22@19:27:24: FAIL: Alarm-Intrusion address from=42.245.203.136
...
2019-07-23 09:08:17
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.245.203.154
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 621
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.245.203.154.			IN	A

;; AUTHORITY SECTION:
.			184	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023021002 1800 900 604800 86400

;; Query time: 83 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 11 12:02:54 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 154.203.245.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 154.203.245.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.22.195.163 attackbotsspam
Wordpress brute-force
2019-11-09 21:00:05
112.105.151.65 attack
firewall-block, port(s): 23/tcp
2019-11-09 21:05:43
95.27.163.146 attackbotsspam
Brute force attempt
2019-11-09 21:25:11
94.177.189.102 attackspambots
Failed password for nobody from 94.177.189.102 port 51682 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.189.102  user=root
Failed password for root from 94.177.189.102 port 33050 ssh2
Invalid user  from 94.177.189.102 port 42614
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.189.102
2019-11-09 21:07:18
151.80.41.124 attackbots
Automatic report - Banned IP Access
2019-11-09 20:54:17
47.100.19.131 attackspam
FTP Brute-Force reported by Fail2Ban
2019-11-09 20:48:41
217.146.30.27 attack
2019-11-09T06:47:37.223891shield sshd\[14192\]: Invalid user up from 217.146.30.27 port 43592
2019-11-09T06:47:37.228169shield sshd\[14192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.146.30.27
2019-11-09T06:47:39.317970shield sshd\[14192\]: Failed password for invalid user up from 217.146.30.27 port 43592 ssh2
2019-11-09T06:51:32.008947shield sshd\[14780\]: Invalid user udo from 217.146.30.27 port 52894
2019-11-09T06:51:32.013812shield sshd\[14780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.146.30.27
2019-11-09 21:07:49
124.104.5.110 attackbotsspam
124.104.5.110 was recorded 5 times by 1 hosts attempting to connect to the following ports: 15941. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-09 21:20:16
89.248.168.217 attackspam
11/09/2019-14:01:54.714723 89.248.168.217 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2019-11-09 21:12:19
115.29.11.56 attack
Nov  9 12:55:06 cavern sshd[12430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.29.11.56
2019-11-09 21:03:02
78.139.200.51 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-11-09 20:47:47
106.54.194.194 attack
2019-11-09T08:58:41.943056abusebot-4.cloudsearch.cf sshd\[10356\]: Invalid user akanistha from 106.54.194.194 port 52048
2019-11-09 20:54:53
49.88.112.72 attackspambots
Nov  9 15:15:21 sauna sshd[85834]: Failed password for root from 49.88.112.72 port 38989 ssh2
...
2019-11-09 21:24:34
49.88.112.77 attackbots
2019-11-09T13:27:18.570571abusebot-3.cloudsearch.cf sshd\[14593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.77  user=root
2019-11-09 21:28:47
160.153.154.137 attack
xmlrpc attack
2019-11-09 21:24:52

Recently Reported IPs

247.234.164.167 144.51.130.17 211.48.198.209 23.106.83.236
104.19.234.207 205.14.59.121 50.177.36.253 215.130.154.22
29.189.81.101 192.168.83.7 33.80.182.44 211.100.6.182
40.98.148.24 239.83.146.0 97.8.119.209 9.28.29.27
114.95.71.130 24.163.118.139 104.167.124.61 15.188.15.192