Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 75.145.149.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54797
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;75.145.149.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 21:58:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
42.149.145.75.in-addr.arpa domain name pointer 75-145-149-42-Illinois.hfc.comcastbusiness.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.149.145.75.in-addr.arpa	name = 75-145-149-42-Illinois.hfc.comcastbusiness.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
161.35.138.131 attack
Aug 19 20:15:56 onepixel sshd[889553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.138.131 
Aug 19 20:15:56 onepixel sshd[889553]: Invalid user budi from 161.35.138.131 port 45636
Aug 19 20:15:58 onepixel sshd[889553]: Failed password for invalid user budi from 161.35.138.131 port 45636 ssh2
Aug 19 20:19:38 onepixel sshd[891788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.138.131  user=root
Aug 19 20:19:40 onepixel sshd[891788]: Failed password for root from 161.35.138.131 port 55786 ssh2
2020-08-20 04:27:00
185.9.18.164 attackbotsspam
trying remote access to NAS as Admin
2020-08-20 04:16:08
185.165.168.168 attackspam
[-]:443 185.165.168.168 - - [19/Aug/2020:14:25:11 +0200] "GET /wp-config-good HTTP/1.1" 404 15123 "[-]" "Mozilla/5.0 (Linux; Android 9; COL-L29) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.111 Mobile Safari/537.36"
2020-08-20 04:20:18
196.189.91.162 attackbots
$f2bV_matches
2020-08-20 04:13:12
177.207.251.18 attackspambots
Aug 17 13:22:43 zatuno sshd[87904]: Failed password for invalid user jitendra from 177.207.251.18 port 37791 ssh2
2020-08-20 04:19:17
49.88.112.75 attackspam
Aug 19 22:27:14 dev0-dcde-rnet sshd[4047]: Failed password for root from 49.88.112.75 port 47378 ssh2
Aug 19 22:27:51 dev0-dcde-rnet sshd[4049]: Failed password for root from 49.88.112.75 port 31559 ssh2
2020-08-20 04:38:20
211.219.18.186 attackbots
Aug 19 21:30:51 ip40 sshd[31058]: Failed password for root from 211.219.18.186 port 32774 ssh2
...
2020-08-20 04:23:56
202.131.69.18 attackbotsspam
2020-08-19T20:12:57.067599randservbullet-proofcloud-66.localdomain sshd[7279]: Invalid user fountain from 202.131.69.18 port 35391
2020-08-19T20:12:57.073005randservbullet-proofcloud-66.localdomain sshd[7279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.fml-group.com
2020-08-19T20:12:57.067599randservbullet-proofcloud-66.localdomain sshd[7279]: Invalid user fountain from 202.131.69.18 port 35391
2020-08-19T20:12:58.775301randservbullet-proofcloud-66.localdomain sshd[7279]: Failed password for invalid user fountain from 202.131.69.18 port 35391 ssh2
...
2020-08-20 04:42:37
45.22.19.58 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-20 04:34:05
139.208.48.207 attackbots
Unauthorised access (Aug 19) SRC=139.208.48.207 LEN=40 TTL=46 ID=6681 TCP DPT=8080 WINDOW=28421 SYN
2020-08-20 04:27:24
189.106.223.84 attack
Aug 17 05:09:56 zatuno sshd[79874]: Failed password for invalid user kerry from 189.106.223.84 port 51311 ssh2
2020-08-20 04:26:38
222.122.160.246 attack
Port Scan detected!
...
2020-08-20 04:15:46
3.7.240.68 attack
SSH Brute-Force. Ports scanning.
2020-08-20 04:26:20
106.51.78.18 attackspambots
Aug 19 21:40:38 ip40 sshd[31794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.78.18 
Aug 19 21:40:39 ip40 sshd[31794]: Failed password for invalid user postgres from 106.51.78.18 port 34322 ssh2
...
2020-08-20 04:48:56
192.35.169.28 attackbotsspam
 TCP (SYN) 192.35.169.28:6760 -> port 5432, len 44
2020-08-20 04:18:36

Recently Reported IPs

186.236.148.148 57.218.105.237 154.76.3.25 6.4.96.207
167.188.24.209 215.17.213.212 103.194.224.88 25.244.209.86
171.144.76.170 197.164.254.150 207.107.171.107 35.164.44.95
196.32.12.212 140.8.69.79 90.249.49.68 226.101.241.176
120.199.96.108 75.192.26.140 222.62.40.254 244.4.157.31