Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.42.157.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7332
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.42.157.193.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 19:19:51 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 193.157.42.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 193.157.42.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
212.80.216.224 attackspam
SSHScan
2019-08-12 12:54:44
218.92.0.204 attackspam
Aug 12 06:29:09 mail sshd\[5924\]: Failed password for root from 218.92.0.204 port 56418 ssh2
Aug 12 06:29:11 mail sshd\[5924\]: Failed password for root from 218.92.0.204 port 56418 ssh2
Aug 12 06:33:58 mail sshd\[6670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
Aug 12 06:34:00 mail sshd\[6670\]: Failed password for root from 218.92.0.204 port 55986 ssh2
Aug 12 06:34:02 mail sshd\[6670\]: Failed password for root from 218.92.0.204 port 55986 ssh2
2019-08-12 12:48:26
185.204.135.118 attackspambots
Failed password for invalid user hacker from 185.204.135.118 port 53228 ssh2
Invalid user r00t from 185.204.135.118 port 41798
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.204.135.118
Failed password for invalid user r00t from 185.204.135.118 port 41798 ssh2
Invalid user nina from 185.204.135.118 port 58600
2019-08-12 12:44:09
104.248.174.126 attack
Automatic report - Banned IP Access
2019-08-12 12:59:53
117.173.67.119 attackbotsspam
Aug  7 17:08:21 cumulus sshd[25975]: Invalid user testtest from 117.173.67.119 port 2057
Aug  7 17:08:21 cumulus sshd[25975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119
Aug  7 17:08:23 cumulus sshd[25975]: Failed password for invalid user testtest from 117.173.67.119 port 2057 ssh2
Aug  7 17:08:23 cumulus sshd[25975]: Received disconnect from 117.173.67.119 port 2057:11: Bye Bye [preauth]
Aug  7 17:08:23 cumulus sshd[25975]: Disconnected from 117.173.67.119 port 2057 [preauth]
Aug  8 04:32:17 cumulus sshd[15453]: Invalid user bruce from 117.173.67.119 port 2058
Aug  8 04:32:17 cumulus sshd[15453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.173.67.119
Aug  8 04:32:19 cumulus sshd[15453]: Failed password for invalid user bruce from 117.173.67.119 port 2058 ssh2
Aug  8 04:32:19 cumulus sshd[15453]: Received disconnect from 117.173.67.119 port 2058:11: Bye Bye [preau........
-------------------------------
2019-08-12 12:52:36
93.115.241.194 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.115.241.194  user=root
Failed password for root from 93.115.241.194 port 33825 ssh2
Failed password for root from 93.115.241.194 port 33825 ssh2
Failed password for root from 93.115.241.194 port 33825 ssh2
Failed password for root from 93.115.241.194 port 33825 ssh2
2019-08-12 12:58:05
193.56.28.236 attackspambots
Aug 12 06:13:22 mail postfix/smtpd\[31368\]: warning: unknown\[193.56.28.236\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 06:13:28 mail postfix/smtpd\[31368\]: warning: unknown\[193.56.28.236\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 06:13:38 mail postfix/smtpd\[31368\]: warning: unknown\[193.56.28.236\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-08-12 12:49:31
201.217.4.220 attack
Aug 12 00:10:43 xtremcommunity sshd\[25179\]: Invalid user ana from 201.217.4.220 port 45420
Aug 12 00:10:43 xtremcommunity sshd\[25179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.4.220
Aug 12 00:10:45 xtremcommunity sshd\[25179\]: Failed password for invalid user ana from 201.217.4.220 port 45420 ssh2
Aug 12 00:17:02 xtremcommunity sshd\[25356\]: Invalid user anathan from 201.217.4.220 port 64086
Aug 12 00:17:02 xtremcommunity sshd\[25356\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.217.4.220
...
2019-08-12 12:22:11
139.99.67.111 attackbots
Aug 12 05:45:29 h2177944 sshd\[2317\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111  user=root
Aug 12 05:45:31 h2177944 sshd\[2317\]: Failed password for root from 139.99.67.111 port 47830 ssh2
Aug 12 05:50:10 h2177944 sshd\[2455\]: Invalid user postgres from 139.99.67.111 port 40176
Aug 12 05:50:10 h2177944 sshd\[2455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.67.111
...
2019-08-12 12:37:08
59.18.197.162 attackbots
Aug 12 07:31:30 yabzik sshd[30774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.18.197.162
Aug 12 07:31:33 yabzik sshd[30774]: Failed password for invalid user monkey from 59.18.197.162 port 51010 ssh2
Aug 12 07:36:36 yabzik sshd[32342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.18.197.162
2019-08-12 12:36:41
185.234.218.120 attackbots
Aug 12 06:37:55 herz-der-gamer postfix/smtpd[2906]: warning: unknown[185.234.218.120]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 12 06:51:39 herz-der-gamer postfix/smtpd[3476]: warning: unknown[185.234.218.120]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-08-12 13:04:09
68.105.28.11 attack
[DoS Attack: TCP/UDP Echo] from source: 68.105.28.11, port 53, Sunday, August 11, 2019
2019-08-12 13:04:08
185.53.88.29 attack
DoS Attack & UDP Port Scan on my network.
2019-08-12 12:36:06
51.254.114.105 attackspambots
Automated report - ssh fail2ban:
Aug 12 06:33:29 wrong password, user=root, port=57527, ssh2
Aug 12 06:40:17 authentication failure
2019-08-12 12:53:58
223.145.113.178 attackbots
Bruteforce on SSH Honeypot
2019-08-12 13:00:49

Recently Reported IPs

204.85.107.62 54.116.19.41 49.207.159.123 119.18.187.125
156.223.138.50 129.15.54.179 8.178.136.222 47.123.164.228
221.227.63.126 168.131.174.206 125.234.28.133 213.69.63.14
39.211.202.89 116.181.206.134 90.91.220.226 123.41.104.18
168.61.49.224 225.111.101.22 72.41.225.201 138.194.207.192