Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 74.242.143.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4590
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;74.242.143.121.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 00:27:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 121.143.242.74.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.143.242.74.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.39.150.116 attackbotsspam
Reported by AbuseIPDB proxy server.
2019-09-02 00:16:29
104.248.159.129 attackbots
2019-09-01T16:13:14.634552abusebot.cloudsearch.cf sshd\[32433\]: Invalid user dbuser from 104.248.159.129 port 60552
2019-09-02 00:22:08
37.221.65.2 attack
this IP hacked my email and accounts i received this IP through my alternate email
2019-09-02 00:55:07
193.17.52.67 attackbotsspam
[SMB remote code execution attempt: port tcp/445]
*(RWIN=1024)(09011312)
2019-09-02 01:11:54
138.68.186.24 attack
2019-09-01T18:07:48.347796  sshd[23266]: Invalid user test from 138.68.186.24 port 60500
2019-09-01T18:07:48.362560  sshd[23266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.186.24
2019-09-01T18:07:48.347796  sshd[23266]: Invalid user test from 138.68.186.24 port 60500
2019-09-01T18:07:50.476485  sshd[23266]: Failed password for invalid user test from 138.68.186.24 port 60500 ssh2
2019-09-01T18:13:31.231058  sshd[23487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.186.24  user=root
2019-09-01T18:13:32.431719  sshd[23487]: Failed password for root from 138.68.186.24 port 47572 ssh2
...
2019-09-02 00:14:14
123.233.246.52 attack
Brute force SMTP login attempts.
2019-09-02 00:32:50
78.128.113.46 attackspam
09/01/2019-03:04:54.034621 78.128.113.46 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-02 00:31:30
165.22.228.242 attack
postfix/smtpd\[26293\]: NOQUEUE: reject: RCPT from mx.expede.naturelike.xyz\[165.22.228.242\]: 554 5.7.1 Service Client host \[165.22.228.242\] blocked using sbl-xbl.spamhaus.org\;
2019-09-02 01:24:12
111.231.66.135 attackspambots
Aug 31 23:16:17 kapalua sshd\[15954\]: Invalid user ftpuser from 111.231.66.135
Aug 31 23:16:17 kapalua sshd\[15954\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.66.135
Aug 31 23:16:19 kapalua sshd\[15954\]: Failed password for invalid user ftpuser from 111.231.66.135 port 37934 ssh2
Aug 31 23:22:13 kapalua sshd\[16487\]: Invalid user russ from 111.231.66.135
Aug 31 23:22:13 kapalua sshd\[16487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.66.135
2019-09-02 01:00:56
51.77.146.136 attackbots
Sep  1 11:06:54 lnxweb61 sshd[18777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.136
2019-09-02 01:08:37
120.132.6.27 attackbotsspam
Sep  1 22:42:16 localhost sshd[2931]: Invalid user marketing from 120.132.6.27 port 45898
Sep  1 22:42:17 localhost sshd[2931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.132.6.27
Sep  1 22:42:16 localhost sshd[2931]: Invalid user marketing from 120.132.6.27 port 45898
Sep  1 22:42:18 localhost sshd[2931]: Failed password for invalid user marketing from 120.132.6.27 port 45898 ssh2
...
2019-09-02 00:28:42
178.128.57.96 attackspambots
Sep  1 09:55:19 mail sshd\[6030\]: Invalid user mc from 178.128.57.96 port 57982
Sep  1 09:55:19 mail sshd\[6030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.57.96
Sep  1 09:55:20 mail sshd\[6030\]: Failed password for invalid user mc from 178.128.57.96 port 57982 ssh2
Sep  1 10:00:12 mail sshd\[7220\]: Invalid user martha from 178.128.57.96 port 46742
Sep  1 10:00:12 mail sshd\[7220\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.57.96
2019-09-02 00:45:59
61.147.80.222 attackspambots
$f2bV_matches
2019-09-02 00:40:28
40.121.198.205 attackbotsspam
Aug 31 21:55:57 web9 sshd\[9502\]: Invalid user won from 40.121.198.205
Aug 31 21:55:57 web9 sshd\[9502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.121.198.205
Aug 31 21:55:59 web9 sshd\[9502\]: Failed password for invalid user won from 40.121.198.205 port 47160 ssh2
Aug 31 22:01:09 web9 sshd\[10742\]: Invalid user liang from 40.121.198.205
Aug 31 22:01:09 web9 sshd\[10742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.121.198.205
2019-09-02 01:17:39
14.204.84.12 attackspambots
$f2bV_matches
2019-09-02 00:28:02

Recently Reported IPs

214.157.164.132 19.104.188.239 45.185.108.87 14.93.8.8
129.195.131.215 234.132.134.151 246.220.85.241 46.202.35.144
15.142.101.40 218.226.248.15 234.174.141.116 218.255.213.115
40.37.109.80 129.151.232.177 25.130.10.15 144.130.161.30
120.68.103.69 201.156.236.122 141.81.108.95 189.182.53.176