Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Taiwan (Province of China)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.73.137.102
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.73.137.102.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 01:43:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
102.137.73.42.in-addr.arpa domain name pointer 42-73-137-102.emome-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
102.137.73.42.in-addr.arpa	name = 42-73-137-102.emome-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.172.152.127 attackbots
Invalid user user4 from 52.172.152.127 port 52364
2020-08-18 00:41:59
80.211.239.49 attackspambots
Aug 17 15:37:02 vm0 sshd[21545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.239.49
Aug 17 15:37:03 vm0 sshd[21545]: Failed password for invalid user jht from 80.211.239.49 port 53392 ssh2
...
2020-08-18 00:37:13
111.229.43.27 attackbots
Aug 17 16:47:02 Invalid user cbs from 111.229.43.27 port 46846
2020-08-18 01:02:29
104.224.187.120 attackspam
Aug 17 17:12:36 ip106 sshd[15233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.224.187.120 
Aug 17 17:12:37 ip106 sshd[15233]: Failed password for invalid user shenjun from 104.224.187.120 port 52286 ssh2
...
2020-08-18 00:23:25
175.199.0.161 attackspambots
Automatic report - Banned IP Access
2020-08-18 01:08:01
116.85.4.240 attack
Aug 17 16:09:22 vps639187 sshd\[26590\]: Invalid user dda from 116.85.4.240 port 34378
Aug 17 16:09:22 vps639187 sshd\[26590\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.85.4.240
Aug 17 16:09:24 vps639187 sshd\[26590\]: Failed password for invalid user dda from 116.85.4.240 port 34378 ssh2
...
2020-08-18 00:58:12
109.248.212.246 attack
Unauthorized connection attempt from IP address 109.248.212.246 on Port 445(SMB)
2020-08-18 00:35:36
180.250.76.124 attack
Unauthorized connection attempt from IP address 180.250.76.124 on Port 445(SMB)
2020-08-18 00:57:23
61.153.2.133 attackbots
Invalid user admin from 61.153.2.133 port 50904
2020-08-18 00:25:26
88.210.29.54 attackbots
Port probing on unauthorized port 1433
2020-08-18 00:59:13
116.206.232.130 attackspambots
20/8/17@08:03:02: FAIL: Alarm-Network address from=116.206.232.130
20/8/17@08:03:02: FAIL: Alarm-Network address from=116.206.232.130
...
2020-08-18 00:43:05
95.165.219.222 attack
Telnet Server BruteForce Attack
2020-08-18 00:55:29
104.16.181.15 attackbotsspam
spam host / http://firstmailer.info/firstmailer/link.php?M=
2020-08-18 00:51:56
117.247.63.79 attackspambots
DATE:2020-08-17 14:41:03, IP:117.247.63.79, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-08-18 00:45:19
60.248.56.139 attack
Unauthorized connection attempt from IP address 60.248.56.139 on Port 445(SMB)
2020-08-18 00:55:54

Recently Reported IPs

240.62.207.150 114.104.205.185 195.206.40.58 114.37.94.184
181.52.71.191 75.165.183.151 57.16.20.242 12.20.193.8
56.110.184.74 186.73.179.189 241.70.228.212 231.131.166.2
222.29.70.179 23.108.40.235 47.159.113.88 99.22.143.155
20.166.70.103 121.15.58.2 226.53.33.71 100.89.211.39