Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
5.42.21.72 attackspambots
DATE:2020-02-13 14:48:56, IP:5.42.21.72, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-02-14 00:04:28
5.42.239.197 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/5.42.239.197/ 
 
 SA - 1H : (12)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : SA 
 NAME ASN : ASN35753 
 
 IP : 5.42.239.197 
 
 CIDR : 5.42.238.0/23 
 
 PREFIX COUNT : 230 
 
 UNIQUE IP COUNT : 194816 
 
 
 ATTACKS DETECTED ASN35753 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-11-18 23:53:44 
 
 INFO : Server 301 - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-11-19 07:40:51
5.42.226.10 attackspam
2019-07-23T05:56:25.288967abusebot-6.cloudsearch.cf sshd\[876\]: Invalid user ze from 5.42.226.10 port 52470
2019-07-23 14:17:13
5.42.226.10 attackspam
Jul 16 08:53:36 srv-4 sshd\[8178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.226.10  user=root
Jul 16 08:53:38 srv-4 sshd\[8178\]: Failed password for root from 5.42.226.10 port 48372 ssh2
Jul 16 08:59:07 srv-4 sshd\[8563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.226.10  user=root
...
2019-07-16 14:15:53
5.42.226.10 attackspam
Jul 15 23:07:35 srv-4 sshd\[30286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.226.10  user=daemon
Jul 15 23:07:37 srv-4 sshd\[30286\]: Failed password for daemon from 5.42.226.10 port 33338 ssh2
Jul 15 23:13:01 srv-4 sshd\[30689\]: Invalid user train5 from 5.42.226.10
Jul 15 23:13:01 srv-4 sshd\[30689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.226.10
...
2019-07-16 04:29:37
5.42.226.10 attackbots
Jul  9 23:35:09 unicornsoft sshd\[15257\]: Invalid user vnc from 5.42.226.10
Jul  9 23:35:09 unicornsoft sshd\[15257\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.42.226.10
Jul  9 23:35:11 unicornsoft sshd\[15257\]: Failed password for invalid user vnc from 5.42.226.10 port 43006 ssh2
2019-07-10 08:10:45
5.42.226.10 attack
Reported by AbuseIPDB proxy server.
2019-07-08 02:00:13
5.42.226.10 attackspambots
Jul  5 20:47:17 dedicated sshd[26725]: Invalid user daniel from 5.42.226.10 port 60224
2019-07-06 07:09:43
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.42.2.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.42.2.153.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:07:12 CST 2025
;; MSG SIZE  rcvd: 103
Host info
153.2.42.5.in-addr.arpa domain name pointer 5-42-2-153.colomna.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
153.2.42.5.in-addr.arpa	name = 5-42-2-153.colomna.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.220.103.8 attack
Feb  5 13:55:06 woltan sshd[1821]: Failed password for invalid user pi from 185.220.103.8 port 45614 ssh2
2020-03-10 06:30:40
106.4.166.36 attack
Brute force blocker - service: proftpd1 - aantal: 155 - Fri Mar  9 21:55:14 2018
2020-03-10 06:44:39
198.211.123.183 attackspambots
Nov 24 05:17:07 woltan sshd[6780]: Failed password for invalid user oracle4 from 198.211.123.183 port 33046 ssh2
2020-03-10 06:37:04
82.147.120.36 attackspam
proto=tcp  .  spt=33642  .  dpt=25  .     Found on   Blocklist de       (511)
2020-03-10 06:48:02
192.241.212.138 attackspam
port scan and connect, tcp 22 (ssh)
2020-03-10 06:39:50
106.75.3.59 attackspambots
Brute-force attempt banned
2020-03-10 06:09:03
177.228.69.44 attack
Email rejected due to spam filtering
2020-03-10 06:40:10
49.50.236.211 attack
20/3/9@17:13:26: FAIL: Alarm-Network address from=49.50.236.211
20/3/9@17:13:26: FAIL: Alarm-Network address from=49.50.236.211
...
2020-03-10 06:09:30
198.245.63.151 attack
Sep 20 19:32:10 ms-srv sshd[57030]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.63.151
Sep 20 19:32:12 ms-srv sshd[57030]: Failed password for invalid user kcs from 198.245.63.151 port 50366 ssh2
2020-03-10 06:22:34
198.23.251.238 attackbots
Dec 18 03:43:55 woltan sshd[26219]: Failed password for invalid user mysql from 198.23.251.238 port 41012 ssh2
2020-03-10 06:26:49
177.137.168.133 attack
proto=tcp  .  spt=35874  .  dpt=25  .     Found on   Blocklist de       (515)
2020-03-10 06:28:21
111.67.207.142 attack
Jan 28 14:20:34 woltan sshd[29598]: Failed password for invalid user ekayana from 111.67.207.142 port 53000 ssh2
2020-03-10 06:38:15
198.23.252.11 attack
Jan 28 11:44:56 ms-srv sshd[48790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.252.11
Jan 28 11:44:57 ms-srv sshd[48790]: Failed password for invalid user postuser from 198.23.252.11 port 57290 ssh2
2020-03-10 06:26:34
198.245.53.163 attackspambots
Aug 29 00:00:23 ms-srv sshd[44686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.245.53.163
Aug 29 00:00:25 ms-srv sshd[44686]: Failed password for invalid user ftpuser1 from 198.245.53.163 port 59620 ssh2
2020-03-10 06:22:59
198.211.116.50 attack
Oct 19 20:02:04 ms-srv sshd[56384]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.211.116.50  user=root
Oct 19 20:02:07 ms-srv sshd[56384]: Failed password for invalid user root from 198.211.116.50 port 49158 ssh2
2020-03-10 06:41:56

Recently Reported IPs

233.215.139.82 123.171.48.196 185.137.185.5 187.238.180.207
37.248.216.80 190.113.182.47 254.46.27.215 66.180.200.208
136.126.215.176 153.36.91.160 248.207.179.58 211.83.202.175
208.6.137.53 223.144.238.112 173.93.15.30 122.59.197.231
225.189.194.103 95.86.28.161 189.149.152.207 29.245.99.20