Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.64.168.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.64.168.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 07:20:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
14.168.64.42.in-addr.arpa domain name pointer 42-64-168-14.emome-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.168.64.42.in-addr.arpa	name = 42-64-168-14.emome-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.75.244.62 attackbotsspam
Nov 12 07:39:49 MK-Soft-VM4 sshd[22598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.244.62 
Nov 12 07:39:51 MK-Soft-VM4 sshd[22598]: Failed password for invalid user derk from 106.75.244.62 port 34760 ssh2
...
2019-11-12 14:43:19
177.11.57.47 attackspam
Automatic report - Port Scan Attack
2019-11-12 14:21:35
106.13.162.75 attackbots
Nov 12 11:06:58 gw1 sshd[5701]: Failed password for root from 106.13.162.75 port 40058 ssh2
...
2019-11-12 14:23:26
182.126.167.54 attack
Fail2Ban Ban Triggered
2019-11-12 14:29:25
89.36.217.142 attackbotsspam
Nov 12 06:37:14 venus sshd\[9096\]: Invalid user holthe from 89.36.217.142 port 60110
Nov 12 06:37:14 venus sshd\[9096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.217.142
Nov 12 06:37:16 venus sshd\[9096\]: Failed password for invalid user holthe from 89.36.217.142 port 60110 ssh2
...
2019-11-12 14:54:43
35.201.243.170 attackspambots
2019-11-12T06:39:41.546939abusebot-6.cloudsearch.cf sshd\[21445\]: Invalid user scouffas from 35.201.243.170 port 60236
2019-11-12 14:45:02
49.88.112.115 attackbotsspam
Nov 12 06:07:26 zeus sshd[31231]: Failed password for root from 49.88.112.115 port 64686 ssh2
Nov 12 06:07:29 zeus sshd[31231]: Failed password for root from 49.88.112.115 port 64686 ssh2
Nov 12 06:07:33 zeus sshd[31231]: Failed password for root from 49.88.112.115 port 64686 ssh2
Nov 12 06:08:15 zeus sshd[31237]: Failed password for root from 49.88.112.115 port 10138 ssh2
2019-11-12 14:17:10
167.99.158.136 attack
Nov 12 01:04:58 ny01 sshd[22650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.158.136
Nov 12 01:05:00 ny01 sshd[22650]: Failed password for invalid user ident from 167.99.158.136 port 56236 ssh2
Nov 12 01:08:32 ny01 sshd[22978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.158.136
2019-11-12 14:26:26
81.242.123.94 attackspambots
81.242.123.94 was recorded 5 times by 1 hosts attempting to connect to the following ports: 5555. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-12 15:05:43
210.56.63.119 attackspambots
11/12/2019-07:31:13.378608 210.56.63.119 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-12 15:10:20
190.37.205.254 attackbotsspam
Automatic report - Port Scan Attack
2019-11-12 14:23:05
54.37.69.74 attack
2019-11-12T06:43:20.507796shield sshd\[5082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.extrakhalifa.com  user=root
2019-11-12T06:43:22.296960shield sshd\[5082\]: Failed password for root from 54.37.69.74 port 56128 ssh2
2019-11-12T06:46:52.395633shield sshd\[5414\]: Invalid user musgrove from 54.37.69.74 port 36600
2019-11-12T06:46:52.399836shield sshd\[5414\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.extrakhalifa.com
2019-11-12T06:46:54.627186shield sshd\[5414\]: Failed password for invalid user musgrove from 54.37.69.74 port 36600 ssh2
2019-11-12 14:57:45
134.175.178.153 attackbots
Invalid user invizibil from 134.175.178.153 port 52421
2019-11-12 14:29:40
50.116.99.88 attack
F2B jail: sshd. Time: 2019-11-12 07:40:06, Reported by: VKReport
2019-11-12 15:07:09
106.12.38.109 attack
2019-11-12T06:33:14.743384abusebot-3.cloudsearch.cf sshd\[27353\]: Invalid user yuyu from 106.12.38.109 port 54178
2019-11-12 15:04:05

Recently Reported IPs

155.208.70.4 163.87.170.234 67.243.102.251 141.228.182.170
150.118.8.36 163.61.134.78 213.247.211.100 192.51.45.96
107.203.207.167 164.81.148.226 56.169.74.236 23.199.37.226
218.144.87.46 120.39.224.51 62.40.164.124 16.245.11.183
84.240.229.72 206.57.54.218 145.226.47.31 42.240.153.32