Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: SK Telecom

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.45.220.226
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45266
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.45.220.226.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061001 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 11 01:34:09 CST 2019
;; MSG SIZE  rcvd: 117

Host info
Host 226.220.45.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 226.220.45.42.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
106.13.83.251 attackspam
Dec 12 13:53:50 web1 sshd\[19921\]: Invalid user gullestad from 106.13.83.251
Dec 12 13:53:50 web1 sshd\[19921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.83.251
Dec 12 13:53:52 web1 sshd\[19921\]: Failed password for invalid user gullestad from 106.13.83.251 port 55946 ssh2
Dec 12 14:00:14 web1 sshd\[20658\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.83.251  user=backup
Dec 12 14:00:17 web1 sshd\[20658\]: Failed password for backup from 106.13.83.251 port 57330 ssh2
2019-12-13 08:14:54
175.124.43.123 attackbotsspam
Dec 13 00:17:17 meumeu sshd[30068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.124.43.123 
Dec 13 00:17:19 meumeu sshd[30068]: Failed password for invalid user xgridagent from 175.124.43.123 port 19175 ssh2
Dec 13 00:23:08 meumeu sshd[31044]: Failed password for root from 175.124.43.123 port 43280 ssh2
...
2019-12-13 07:41:04
51.255.86.223 attackbots
Dec 12 23:49:32 karger wordpress(www.b)[27576]: XML-RPC authentication failure for admin from 51.255.86.223
Dec 12 23:54:47 karger wordpress(www.b)[27576]: XML-RPC authentication failure for admin from 51.255.86.223
Dec 13 00:00:17 karger wordpress(www.b)[27576]: XML-RPC authentication failure for admin from 51.255.86.223
Dec 13 00:05:56 karger wordpress(www.b)[27576]: XML-RPC authentication failure for admin from 51.255.86.223
Dec 13 00:11:33 karger wordpress(www.b)[27576]: XML-RPC authentication failure for admin from 51.255.86.223
...
2019-12-13 07:38:16
128.199.75.69 attackbotsspam
Dec 12 23:50:32 web8 sshd\[22173\]: Invalid user rpc from 128.199.75.69
Dec 12 23:50:32 web8 sshd\[22173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.75.69
Dec 12 23:50:34 web8 sshd\[22173\]: Failed password for invalid user rpc from 128.199.75.69 port 36849 ssh2
Dec 12 23:58:37 web8 sshd\[26094\]: Invalid user reznick from 128.199.75.69
Dec 12 23:58:37 web8 sshd\[26094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.75.69
2019-12-13 08:10:28
118.24.2.218 attack
SSH bruteforce (Triggered fail2ban)
2019-12-13 08:00:59
36.26.72.16 attack
Dec 12 20:46:24 ws12vmsma01 sshd[30517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.26.72.16 
Dec 12 20:46:24 ws12vmsma01 sshd[30517]: Invalid user server from 36.26.72.16
Dec 12 20:46:26 ws12vmsma01 sshd[30517]: Failed password for invalid user server from 36.26.72.16 port 55770 ssh2
...
2019-12-13 08:00:43
111.230.140.177 attackspam
Dec 12 02:41:58 server sshd\[768\]: Failed password for invalid user cabi from 111.230.140.177 port 33618 ssh2
Dec 13 01:27:32 server sshd\[23344\]: Invalid user couto from 111.230.140.177
Dec 13 01:27:32 server sshd\[23344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.140.177 
Dec 13 01:27:34 server sshd\[23344\]: Failed password for invalid user couto from 111.230.140.177 port 52728 ssh2
Dec 13 01:47:28 server sshd\[29530\]: Invalid user backup from 111.230.140.177
Dec 13 01:47:28 server sshd\[29530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.140.177 
...
2019-12-13 07:42:01
79.137.33.20 attack
Dec 12 12:42:29 auw2 sshd\[10840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-79-137-33.eu  user=root
Dec 12 12:42:31 auw2 sshd\[10840\]: Failed password for root from 79.137.33.20 port 37935 ssh2
Dec 12 12:47:30 auw2 sshd\[11400\]: Invalid user koontz from 79.137.33.20
Dec 12 12:47:30 auw2 sshd\[11400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.ip-79-137-33.eu
Dec 12 12:47:32 auw2 sshd\[11400\]: Failed password for invalid user koontz from 79.137.33.20 port 42149 ssh2
2019-12-13 07:38:44
185.84.180.90 attackbotsspam
WordPress wp-login brute force :: 185.84.180.90 0.112 BYPASS [12/Dec/2019:22:46:56  0000] www.[censored_4] "POST /wp-login.php HTTP/1.1" 200 2132 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-13 08:11:38
51.68.192.106 attack
Invalid user noahbryce from 51.68.192.106 port 41074
2019-12-13 08:14:10
103.17.55.200 attackbots
Dec 12 13:01:49 eddieflores sshd\[26183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.55.200  user=bin
Dec 12 13:01:50 eddieflores sshd\[26183\]: Failed password for bin from 103.17.55.200 port 44075 ssh2
Dec 12 13:08:44 eddieflores sshd\[26869\]: Invalid user test from 103.17.55.200
Dec 12 13:08:44 eddieflores sshd\[26869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.55.200
Dec 12 13:08:46 eddieflores sshd\[26869\]: Failed password for invalid user test from 103.17.55.200 port 49857 ssh2
2019-12-13 07:48:52
115.231.163.85 attackbots
Dec 13 00:09:58 ns41 sshd[11964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.163.85
Dec 13 00:09:58 ns41 sshd[11964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.163.85
2019-12-13 07:45:50
182.73.123.118 attackbots
2019-12-13T00:47:16.802740vps751288.ovh.net sshd\[11971\]: Invalid user mdh from 182.73.123.118 port 46677
2019-12-13T00:47:16.811240vps751288.ovh.net sshd\[11971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118
2019-12-13T00:47:18.814940vps751288.ovh.net sshd\[11971\]: Failed password for invalid user mdh from 182.73.123.118 port 46677 ssh2
2019-12-13T00:54:04.664654vps751288.ovh.net sshd\[12029\]: Invalid user web from 182.73.123.118 port 15223
2019-12-13T00:54:04.674691vps751288.ovh.net sshd\[12029\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118
2019-12-13 07:59:27
128.201.96.118 attackspambots
Dec 13 00:38:50 eventyay sshd[26068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.201.96.118
Dec 13 00:38:52 eventyay sshd[26068]: Failed password for invalid user dworak from 128.201.96.118 port 35750 ssh2
Dec 13 00:45:19 eventyay sshd[26312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.201.96.118
...
2019-12-13 07:48:27
121.7.127.92 attack
Dec 12 18:40:55 linuxvps sshd\[19184\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.7.127.92  user=root
Dec 12 18:40:56 linuxvps sshd\[19184\]: Failed password for root from 121.7.127.92 port 33816 ssh2
Dec 12 18:47:39 linuxvps sshd\[23096\]: Invalid user info from 121.7.127.92
Dec 12 18:47:39 linuxvps sshd\[23096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.7.127.92
Dec 12 18:47:41 linuxvps sshd\[23096\]: Failed password for invalid user info from 121.7.127.92 port 37994 ssh2
2019-12-13 07:54:06

Recently Reported IPs

89.120.7.113 151.26.181.89 51.79.32.20 81.164.46.25
73.8.100.238 182.74.231.240 5.66.57.250 78.165.90.122
203.78.114.110 105.138.181.20 126.21.195.34 53.29.11.163
108.28.187.174 87.2.240.189 78.85.150.229 158.140.182.255
182.126.65.179 34.111.126.246 110.12.239.53 178.152.157.31