Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.0.242.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.0.242.148.			IN	A

;; AUTHORITY SECTION:
.			574	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022401 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 04:27:03 CST 2022
;; MSG SIZE  rcvd: 104
Host info
148.242.0.1.in-addr.arpa domain name pointer node-mms.pool-1-0.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.242.0.1.in-addr.arpa	name = node-mms.pool-1-0.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.3.30.15 attack
web-1 [ssh_2] SSH Attack
2020-06-24 18:16:44
173.232.33.9 spam
Aggressive email spammer on subnet 173.232.33.*
2020-06-24 18:04:02
142.93.246.42 attack
Jun 24 09:57:29 jumpserver sshd[198740]: Failed password for root from 142.93.246.42 port 44052 ssh2
Jun 24 10:00:46 jumpserver sshd[198783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.246.42  user=root
Jun 24 10:00:48 jumpserver sshd[198783]: Failed password for root from 142.93.246.42 port 45026 ssh2
...
2020-06-24 18:23:30
165.22.39.92 attackspam
 TCP (SYN) 165.22.39.92:32767 -> port 18083, len 44
2020-06-24 18:12:18
173.232.33.13 spam
Aggressive email spammer on subnet 173.232.33.*
2020-06-24 18:04:08
173.232.33.37 spam
Aggressive email spammer on subnet 173.232.33.*
2020-06-24 18:03:09
173.232.33.11 spam
Aggressive email spammer on subnet 173.232.33.*
2020-06-24 18:04:25
163.172.29.120 attack
$f2bV_matches
2020-06-24 18:11:04
173.232.33.51 spam
Aggressive email spammer on subnet 173.232.33.*
2020-06-24 18:02:37
173.232.33.45 spam
Aggressive email spammer on subnet 173.232.33.*
2020-06-24 18:03:27
190.242.104.218 attack
Unauthorised access (Jun 24) SRC=190.242.104.218 LEN=52 TTL=109 ID=26228 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-24 18:06:58
193.32.161.147 attackbots
SmallBizIT.US 7 packets to tcp(2239,2240,2241,8101,8102,8103,21688)
2020-06-24 18:11:18
82.62.153.15 attackspambots
Invalid user pu from 82.62.153.15 port 49553
2020-06-24 18:14:18
176.31.105.136 attack
Invalid user anuel from 176.31.105.136 port 60932
2020-06-24 18:24:26
185.157.222.47 attackspambots
185.157.222.47 - - [24/Jun/2020:08:09:11 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.157.222.47 - - [24/Jun/2020:08:09:12 +0100] "POST /wp-login.php HTTP/1.1" 200 1860 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
185.157.222.47 - - [24/Jun/2020:08:09:12 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-24 18:01:42

Recently Reported IPs

1.0.242.146 1.0.242.151 1.0.242.160 1.0.242.162
218.140.104.76 1.0.242.17 85.114.128.19 1.0.242.174
1.0.242.183 1.0.242.200 1.0.242.203 1.0.242.21
1.0.242.224 1.0.242.228 1.0.242.233 1.0.242.240
1.0.242.244 1.0.242.255 1.0.242.33 1.0.242.61