Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lakewood

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.149.187.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24895
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;98.149.187.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 20:42:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
42.187.149.98.in-addr.arpa domain name pointer syn-098-149-187-042.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.187.149.98.in-addr.arpa	name = syn-098-149-187-042.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.78.114.205 attackspam
Email rejected due to spam filtering
2020-03-11 15:01:05
172.81.243.232 attackbotsspam
SSH Brute-Forcing (server2)
2020-03-11 15:18:55
106.12.60.239 attackspambots
$f2bV_matches
2020-03-11 15:46:08
103.94.8.235 attackspambots
1583892666 - 03/11/2020 03:11:06 Host: 103.94.8.235/103.94.8.235 Port: 445 TCP Blocked
2020-03-11 15:40:14
171.250.82.245 attackspam
" "
2020-03-11 15:17:14
78.128.113.182 attack
15 attempts against mh-mag-login-ban on comet
2020-03-11 15:04:20
61.154.14.234 attackbots
SSH Authentication Attempts Exceeded
2020-03-11 15:12:55
104.248.35.239 attackbotsspam
Invalid user ts3server from 104.248.35.239 port 49282
2020-03-11 15:49:58
139.199.248.153 attackspam
5x Failed Password
2020-03-11 15:49:21
222.186.175.216 attackbotsspam
Mar 11 08:17:21 minden010 sshd[20348]: Failed password for root from 222.186.175.216 port 4100 ssh2
Mar 11 08:17:34 minden010 sshd[20348]: Failed password for root from 222.186.175.216 port 4100 ssh2
Mar 11 08:17:34 minden010 sshd[20348]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 4100 ssh2 [preauth]
...
2020-03-11 15:22:28
103.247.226.114 attackbots
TCP src-port=43651   dst-port=25   Listed on   dnsbl-sorbs abuseat-org barracuda       (Project Honey Pot rated Suspicious & Spammer)   (45)
2020-03-11 15:05:06
49.235.115.221 attack
SSH invalid-user multiple login attempts
2020-03-11 15:21:47
103.140.194.67 attack
TCP src-port=43245   dst-port=25   Listed on   barracuda zen-spamhaus spam-sorbs         (43)
2020-03-11 15:12:36
207.154.239.128 attack
$f2bV_matches
2020-03-11 15:10:30
111.93.71.219 attackbots
Mar 11 08:15:35 mail sshd\[15418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219  user=root
Mar 11 08:15:37 mail sshd\[15418\]: Failed password for root from 111.93.71.219 port 43636 ssh2
Mar 11 08:17:23 mail sshd\[15427\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.93.71.219  user=root
...
2020-03-11 15:18:27

Recently Reported IPs

58.160.174.131 54.154.93.157 223.14.75.239 17.243.3.56
151.120.133.141 149.115.111.181 7.34.120.223 205.23.155.4
253.37.214.212 100.254.133.153 63.21.95.94 186.189.56.107
210.108.165.206 222.27.227.131 171.13.207.20 73.115.129.143
125.135.5.249 55.90.231.45 171.56.74.1 89.108.102.201