Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.43.66.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19728
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.43.66.73.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:13:04 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 73.66.43.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 73.66.43.42.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.117.120.26 attackspam
Telnetd brute force attack detected by fail2ban
2019-11-06 16:43:44
185.74.4.189 attackspam
Nov  6 08:56:28 v22018076622670303 sshd\[18973\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.189  user=root
Nov  6 08:56:30 v22018076622670303 sshd\[18973\]: Failed password for root from 185.74.4.189 port 53302 ssh2
Nov  6 09:00:37 v22018076622670303 sshd\[18983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.74.4.189  user=root
...
2019-11-06 16:45:21
138.68.4.198 attackspambots
Nov  6 09:40:18 meumeu sshd[28247]: Failed password for root from 138.68.4.198 port 37056 ssh2
Nov  6 09:43:43 meumeu sshd[28647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198 
Nov  6 09:43:44 meumeu sshd[28647]: Failed password for invalid user admin from 138.68.4.198 port 45752 ssh2
...
2019-11-06 16:48:09
129.204.90.220 attackbots
2019-11-06T07:30:29.072032abusebot-5.cloudsearch.cf sshd\[4605\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.90.220  user=root
2019-11-06 16:24:37
34.212.63.114 attackspam
11/06/2019-09:12:02.900849 34.212.63.114 Protocol: 6 SURICATA TLS invalid record/traffic
2019-11-06 16:26:47
45.136.109.174 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-11-06 16:39:53
106.12.77.212 attackbotsspam
Nov  6 09:01:52 legacy sshd[21392]: Failed password for root from 106.12.77.212 port 35432 ssh2
Nov  6 09:06:47 legacy sshd[21552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.77.212
Nov  6 09:06:49 legacy sshd[21552]: Failed password for invalid user sbin from 106.12.77.212 port 44172 ssh2
...
2019-11-06 16:15:30
157.52.255.116 attackbotsspam
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2019-11-06 16:52:01
189.38.237.133 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/189.38.237.133/ 
 
 BR - 1H : (304)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : BR 
 NAME ASN : ASN19182 
 
 IP : 189.38.237.133 
 
 CIDR : 189.38.128.0/17 
 
 PREFIX COUNT : 63 
 
 UNIQUE IP COUNT : 236800 
 
 
 ATTACKS DETECTED ASN19182 :  
  1H - 1 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 3 
 
 DateTime : 2019-11-06 07:27:57 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-06 16:28:48
69.70.65.118 attackbotsspam
[Aegis] @ 2019-11-06 08:03:19  0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-11-06 16:35:10
60.168.128.2 attackspam
Nov  6 09:05:53 server sshd\[18455\]: Invalid user osmc from 60.168.128.2
Nov  6 09:05:53 server sshd\[18455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.168.128.2 
Nov  6 09:05:54 server sshd\[18455\]: Failed password for invalid user osmc from 60.168.128.2 port 59604 ssh2
Nov  6 09:27:54 server sshd\[24093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.168.128.2  user=root
Nov  6 09:27:56 server sshd\[24093\]: Failed password for root from 60.168.128.2 port 51470 ssh2
...
2019-11-06 16:31:54
101.68.81.66 attack
Aug 13 23:18:43 mail sshd\[741\]: Invalid user teamspeak3 from 101.68.81.66 port 47152
Aug 13 23:18:43 mail sshd\[741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.68.81.66
Aug 13 23:18:45 mail sshd\[741\]: Failed password for invalid user teamspeak3 from 101.68.81.66 port 47152 ssh2
Aug 13 23:48:44 mail sshd\[28524\]: Invalid user tomas from 101.68.81.66 port 41556
Aug 13 23:48:44 mail sshd\[28524\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.68.81.66
Aug 14 00:53:41 mail sshd\[28994\]: Invalid user gpadmin from 101.68.81.66 port 58024
Aug 14 00:53:41 mail sshd\[28994\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.68.81.66
Aug 14 00:53:43 mail sshd\[28994\]: Failed password for invalid user gpadmin from 101.68.81.66 port 58024 ssh2
Aug 14 01:28:43 mail sshd\[23162\]: Invalid user fourjs from 101.68.81.66 port 52148
Aug 14 01:28:43 mail sshd\[23162\]: pam_u
2019-11-06 16:53:11
198.27.116.229 attackbotsspam
[Aegis] @ 2019-11-06 07:27:50  0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-11-06 16:23:36
222.186.175.169 attack
Nov  6 09:31:36 vpn01 sshd[26558]: Failed password for root from 222.186.175.169 port 23790 ssh2
Nov  6 09:31:40 vpn01 sshd[26558]: Failed password for root from 222.186.175.169 port 23790 ssh2
...
2019-11-06 16:33:39
40.73.116.245 attack
Nov  5 22:03:21 web1 sshd\[9149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.116.245  user=root
Nov  5 22:03:23 web1 sshd\[9149\]: Failed password for root from 40.73.116.245 port 59104 ssh2
Nov  5 22:08:25 web1 sshd\[9565\]: Invalid user ubnt from 40.73.116.245
Nov  5 22:08:25 web1 sshd\[9565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.116.245
Nov  5 22:08:27 web1 sshd\[9565\]: Failed password for invalid user ubnt from 40.73.116.245 port 39782 ssh2
2019-11-06 16:38:52

Recently Reported IPs

207.180.179.185 200.37.123.168 172.235.176.102 59.107.214.182
20.182.4.123 208.196.36.21 224.34.134.230 101.228.24.109
28.189.230.2 7.242.21.191 224.161.164.208 46.192.196.98
140.168.22.231 53.235.246.31 51.134.228.210 90.17.224.75
31.152.93.63 179.250.48.68 83.67.250.243 134.140.175.133