Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shenyang

Region: Liaoning

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.56.105.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.56.105.158.			IN	A

;; AUTHORITY SECTION:
.			239	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020090202 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Sep 03 12:06:13 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 158.105.56.42.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 158.105.56.42.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
68.183.146.249 attackspambots
68.183.146.249 - - [30/Jun/2020:05:35:25 +0100] "POST /wp-login.php HTTP/1.1" 200 2435 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.146.249 - - [30/Jun/2020:05:35:26 +0100] "POST /wp-login.php HTTP/1.1" 200 2408 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.146.249 - - [30/Jun/2020:05:35:27 +0100] "POST /wp-login.php HTTP/1.1" 200 2440 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-30 16:56:23
123.59.213.68 attackspam
Invalid user binny from 123.59.213.68 port 55190
2020-06-30 16:59:47
189.69.115.159 attackspam
ssh intrusion attempt
2020-06-30 16:57:50
59.15.3.197 attackspambots
(sshd) Failed SSH login from 59.15.3.197 (KR/South Korea/-): 5 in the last 3600 secs
2020-06-30 17:16:42
85.171.52.251 attackbotsspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-30T07:03:44Z and 2020-06-30T07:36:54Z
2020-06-30 17:06:41
106.254.255.42 attackbotsspam
2020-06-30T01:33:53.2141951495-001 sshd[29548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.254.255.42  user=root
2020-06-30T01:33:55.6569461495-001 sshd[29548]: Failed password for root from 106.254.255.42 port 54918 ssh2
2020-06-30T01:37:24.1336971495-001 sshd[29728]: Invalid user benjamin from 106.254.255.42 port 39228
2020-06-30T01:37:24.1373741495-001 sshd[29728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.254.255.42
2020-06-30T01:37:24.1336971495-001 sshd[29728]: Invalid user benjamin from 106.254.255.42 port 39228
2020-06-30T01:37:26.2136061495-001 sshd[29728]: Failed password for invalid user benjamin from 106.254.255.42 port 39228 ssh2
...
2020-06-30 17:01:03
42.200.206.225 attackspambots
SSH Bruteforce Attempt (failed auth)
2020-06-30 17:07:01
183.80.120.31 attackspambots
Automatic report - Port Scan Attack
2020-06-30 16:51:10
139.186.8.212 attackbotsspam
Invalid user printer from 139.186.8.212 port 57404
2020-06-30 16:58:28
157.245.233.164 attackbots
157.245.233.164 - - [30/Jun/2020:05:51:32 +0200] "POST /wp-login.php HTTP/1.1" 200 3434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.233.164 - - [30/Jun/2020:05:51:33 +0200] "POST /wp-login.php HTTP/1.1" 200 3433 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-30 16:55:07
80.211.13.167 attack
Jun 29 22:36:56 web1 sshd\[5946\]: Invalid user ubuntu from 80.211.13.167
Jun 29 22:36:56 web1 sshd\[5946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.13.167
Jun 29 22:36:58 web1 sshd\[5946\]: Failed password for invalid user ubuntu from 80.211.13.167 port 48828 ssh2
Jun 29 22:40:36 web1 sshd\[6346\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.13.167  user=root
Jun 29 22:40:38 web1 sshd\[6346\]: Failed password for root from 80.211.13.167 port 47310 ssh2
2020-06-30 16:42:02
121.138.174.51 attackspambots
unauthorized connection attempt
2020-06-30 16:49:53
67.205.137.32 attack
2020-06-30T07:00:37.642421abusebot-3.cloudsearch.cf sshd[3864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.137.32  user=root
2020-06-30T07:00:39.171061abusebot-3.cloudsearch.cf sshd[3864]: Failed password for root from 67.205.137.32 port 47310 ssh2
2020-06-30T07:03:33.133494abusebot-3.cloudsearch.cf sshd[3883]: Invalid user wyf from 67.205.137.32 port 45958
2020-06-30T07:03:33.140406abusebot-3.cloudsearch.cf sshd[3883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.137.32
2020-06-30T07:03:33.133494abusebot-3.cloudsearch.cf sshd[3883]: Invalid user wyf from 67.205.137.32 port 45958
2020-06-30T07:03:35.497116abusebot-3.cloudsearch.cf sshd[3883]: Failed password for invalid user wyf from 67.205.137.32 port 45958 ssh2
2020-06-30T07:06:29.973649abusebot-3.cloudsearch.cf sshd[3981]: Invalid user hayden from 67.205.137.32 port 44630
...
2020-06-30 17:04:21
176.31.127.152 attackspambots
2020-06-30T13:59:20.921221billing sshd[21653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3141807.ip-176-31-127.eu
2020-06-30T13:59:20.918537billing sshd[21653]: Invalid user tg from 176.31.127.152 port 46240
2020-06-30T13:59:22.559893billing sshd[21653]: Failed password for invalid user tg from 176.31.127.152 port 46240 ssh2
...
2020-06-30 16:38:42
85.239.35.12 attackspam
Jun 30 08:19:52 srv sshd[32549]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.239.35.12
2020-06-30 16:40:31

Recently Reported IPs

54.253.12.113 38.127.112.58 172.99.22.251 202.20.73.5
39.163.98.102 160.10.98.220 34.14.191.147 187.198.232.14
23.3.24.27 160.184.57.123 119.40.76.166 87.127.88.185
223.119.173.160 115.223.214.122 122.36.203.46 179.7.198.172
211.190.39.135 121.126.139.203 45.160.119.2 138.184.125.62