Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.105.242.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15535
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.105.242.67.			IN	A

;; AUTHORITY SECTION:
.			260	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 05:01:27 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 67.242.105.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.242.105.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.98.203.20 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-30 22:59:03
89.248.172.140 attackspam
 TCP (SYN) 89.248.172.140:44912 -> port 3410, len 44
2020-09-30 23:10:43
62.4.15.205 attack
SIPVicious Scanner Detection
2020-09-30 23:15:55
104.206.128.26 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 94 - port: 23 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:34:17
167.248.133.69 attackspambots
 TCP (SYN) 167.248.133.69:28321 -> port 4500, len 44
2020-09-30 23:00:32
213.184.254.128 attackspambots
445/tcp 1433/tcp...
[2020-08-04/09-29]7pkt,2pt.(tcp)
2020-09-30 22:58:14
141.98.81.141 attackbotsspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-30T14:52:58Z
2020-09-30 23:31:04
156.96.112.211 attackspam
[29/Sep/2020:15:18:47 -0400] "GET / HTTP/1.1" Blank UA
[29/Sep/2020:16:41:19 -0400] "GET / HTTP/1.1" Blank UA
[29/Sep/2020:16:42:38 -0400] "GET / HTTP/1.1" Blank UA
2020-09-30 23:30:38
71.6.232.6 attackspam
UDP port : 123
2020-09-30 23:14:48
111.40.7.84 attackbots
firewall-block, port(s): 1433/tcp
2020-09-30 23:32:18
207.154.242.83 attack
Invalid user admin from 207.154.242.83 port 36950
2020-09-30 22:58:43
116.177.248.202 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 124
2020-09-30 23:31:39
5.61.58.53 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 5 - port: 55593 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 23:23:15
94.102.56.238 attackspam
TCP port : 5900
2020-09-30 23:08:21
37.59.141.40 attack
37.59.141.40 - - [30/Sep/2020:02:27:32 +0200] "GET /wp-login.php HTTP/1.1" 200 8712 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.59.141.40 - - [30/Sep/2020:02:27:33 +0200] "POST /wp-login.php HTTP/1.1" 200 8942 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.59.141.40 - - [30/Sep/2020:02:27:34 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-30 22:54:53

Recently Reported IPs

1.103.232.33 1.110.183.154 1.104.81.227 1.102.253.83
1.107.157.5 1.105.95.167 1.106.27.197 1.107.17.225
1.106.188.250 1.106.37.219 1.104.177.139 1.105.52.7
1.105.69.12 1.104.243.240 1.106.164.91 1.106.202.76
1.110.23.118 1.105.116.45 1.106.65.118 1.106.76.87