Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Gyeonggi-do

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.242.203.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.242.203.146.			IN	A

;; AUTHORITY SECTION:
.			207	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022111100 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 11 18:11:28 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 146.203.242.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 146.203.242.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.163.197.138 attackbots
Oct  8 23:41:07 localhost sshd\[24312\]: Invalid user Webmaster!@\#\$% from 192.163.197.138 port 45654
Oct  8 23:41:07 localhost sshd\[24312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.163.197.138
Oct  8 23:41:08 localhost sshd\[24312\]: Failed password for invalid user Webmaster!@\#\$% from 192.163.197.138 port 45654 ssh2
2019-10-09 05:48:37
182.190.4.53 attackbots
Automatic report - Banned IP Access
2019-10-09 05:20:04
189.180.186.2 attack
Automatic report - Port Scan Attack
2019-10-09 05:59:41
104.42.25.12 attackspambots
Oct  8 23:02:49 markkoudstaal sshd[6284]: Failed password for root from 104.42.25.12 port 6976 ssh2
Oct  8 23:06:55 markkoudstaal sshd[6640]: Failed password for root from 104.42.25.12 port 6976 ssh2
2019-10-09 05:32:59
5.196.110.170 attackspam
Oct  9 02:04:19 gw1 sshd[24176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.110.170
Oct  9 02:04:21 gw1 sshd[24176]: Failed password for invalid user zabbix from 5.196.110.170 port 54854 ssh2
...
2019-10-09 05:36:25
58.242.68.178 attack
Unauthorized SSH login attempts
2019-10-09 05:47:21
178.79.25.126 attackspam
Automatic report - Banned IP Access
2019-10-09 05:52:08
87.67.96.48 attack
Oct  8 01:44:21 *** sshd[8534]: Failed password for invalid user 123 from 87.67.96.48 port 55628 ssh2
Oct  8 01:44:32 *** sshd[8540]: Failed password for invalid user Admin@60 from 87.67.96.48 port 56356 ssh2
Oct  8 01:44:41 *** sshd[8544]: Failed password for invalid user Paris@2018 from 87.67.96.48 port 57082 ssh2
Oct  8 01:44:50 *** sshd[8547]: Failed password for invalid user 1@3qWeaSdzXc from 87.67.96.48 port 57804 ssh2
Oct  8 01:45:00 *** sshd[8550]: Failed password for invalid user 1@3qWeaSdzXc from 87.67.96.48 port 58528 ssh2
Oct  8 01:45:08 *** sshd[8556]: Failed password for invalid user Huston@2017 from 87.67.96.48 port 59252 ssh2
Oct  8 01:45:24 *** sshd[8561]: Failed password for invalid user Anton123 from 87.67.96.48 port 59982 ssh2
Oct  8 01:45:39 *** sshd[8570]: Failed password for invalid user C3ntos@2020 from 87.67.96.48 port 60710 ssh2
Oct  8 01:45:51 *** sshd[8579]: Failed password for invalid user Standard2017 from 87.67.96.48 port 33202 ssh2
Oct  8 01:46:05 *** sshd[8584]: Failed passwor
2019-10-09 05:25:32
198.71.238.11 attack
Automatic report - XMLRPC Attack
2019-10-09 05:54:27
120.136.167.74 attackbotsspam
Oct  8 23:06:13 icinga sshd[9253]: Failed password for root from 120.136.167.74 port 34386 ssh2
...
2019-10-09 05:32:41
103.76.21.181 attackspambots
Oct  8 23:33:06 vps647732 sshd[18735]: Failed password for root from 103.76.21.181 port 48468 ssh2
...
2019-10-09 05:41:23
14.215.165.131 attackbotsspam
2019-10-08T17:23:13.4640841495-001 sshd\[42865\]: Invalid user Leonardo1@3 from 14.215.165.131 port 37124
2019-10-08T17:23:13.4711231495-001 sshd\[42865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.165.131
2019-10-08T17:23:15.2863121495-001 sshd\[42865\]: Failed password for invalid user Leonardo1@3 from 14.215.165.131 port 37124 ssh2
2019-10-08T17:26:55.7935001495-001 sshd\[43096\]: Invalid user P4ssw0rt1q from 14.215.165.131 port 42500
2019-10-08T17:26:55.7966221495-001 sshd\[43096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.215.165.131
2019-10-08T17:26:57.7567791495-001 sshd\[43096\]: Failed password for invalid user P4ssw0rt1q from 14.215.165.131 port 42500 ssh2
...
2019-10-09 05:47:48
74.208.252.136 attackbots
Oct  8 11:29:27 sachi sshd\[3048\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.252.136  user=root
Oct  8 11:29:29 sachi sshd\[3048\]: Failed password for root from 74.208.252.136 port 60258 ssh2
Oct  8 11:33:14 sachi sshd\[3388\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.252.136  user=root
Oct  8 11:33:16 sachi sshd\[3388\]: Failed password for root from 74.208.252.136 port 43140 ssh2
Oct  8 11:36:51 sachi sshd\[3709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.252.136  user=root
2019-10-09 05:38:50
185.220.101.3 attackspambots
abcdata-sys.de:80 185.220.101.3 - - \[08/Oct/2019:22:03:58 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 497 "-" "Mozilla/5.0 \(X11\; Linux x86_64\; rv:61.0\) Gecko/20100101 Firefox/61.0"
www.goldgier.de 185.220.101.3 \[08/Oct/2019:22:03:59 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 4081 "-" "Mozilla/5.0 \(X11\; Linux x86_64\; rv:61.0\) Gecko/20100101 Firefox/61.0"
2019-10-09 05:56:37
121.67.246.141 attackspambots
Oct  8 21:43:09 apollo sshd\[8494\]: Failed password for root from 121.67.246.141 port 39864 ssh2Oct  8 22:00:03 apollo sshd\[8578\]: Failed password for root from 121.67.246.141 port 34236 ssh2Oct  8 22:04:21 apollo sshd\[8609\]: Failed password for root from 121.67.246.141 port 45890 ssh2
...
2019-10-09 05:40:55

Recently Reported IPs

1.242.212.131 112.229.230.15 1.240.41.218 1.235.160.114
1.235.184.114 1.234.65.136 1.234.20.219 1.235.164.112
1.233.51.82 1.233.61.92 1.234.120.237 1.234.164.75
1.230.244.144 1.231.18.254 1.230.203.57 1.230.4.253
1.229.54.159 1.23.119.94 1.23.198.184 1.23.136.199