Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 10.42.136.217
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60859
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;10.42.136.217.			IN	A

;; AUTHORITY SECTION:
.			337	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022112700 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 27 20:26:59 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 217.136.42.10.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 217.136.42.10.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
72.249.56.7 attackspam
firewall-block, port(s): 1433/tcp
2020-05-31 21:51:35
179.210.251.13 attackbots
Unauthorized connection attempt detected from IP address 179.210.251.13 to port 23
2020-05-31 21:34:33
223.71.167.164 attackspam
scans 10 times in preceeding hours on the ports (in chronological order) 9306 9999 14000 8161 1911 8088 49151 2002 10005 1200 resulting in total of 10 scans from 223.64.0.0/11 block.
2020-05-31 21:25:41
91.234.124.52 attackspambots
Unauthorized connection attempt detected from IP address 91.234.124.52 to port 8080
2020-05-31 21:46:29
45.170.174.31 attack
Unauthorized connection attempt detected from IP address 45.170.174.31 to port 2323
2020-05-31 21:18:47
222.245.49.242 attack
Unauthorized connection attempt detected from IP address 222.245.49.242 to port 5555
2020-05-31 21:58:54
36.34.163.105 attackbots
Unauthorized connection attempt detected from IP address 36.34.163.105 to port 26
2020-05-31 21:57:29
189.207.246.86 attackspambots
Unauthorized connection attempt detected from IP address 189.207.246.86 to port 445
2020-05-31 21:31:20
220.249.19.94 attack
Unauthorized connection attempt detected from IP address 220.249.19.94 to port 1433
2020-05-31 22:01:23
41.207.248.50 attackspam
Unauthorized connection attempt detected from IP address 41.207.248.50 to port 23
2020-05-31 21:21:05
69.246.87.241 attackspam
Unauthorized connection attempt detected from IP address 69.246.87.241 to port 23
2020-05-31 21:52:03
193.56.28.158 attack
Unauthorized connection attempt detected from IP address 193.56.28.158 to port 1080
2020-05-31 21:29:24
222.186.30.112 attack
May 31 09:55:24 NPSTNNYC01T sshd[30435]: Failed password for root from 222.186.30.112 port 49240 ssh2
May 31 09:55:33 NPSTNNYC01T sshd[30456]: Failed password for root from 222.186.30.112 port 22596 ssh2
...
2020-05-31 21:59:50
45.136.108.67 attackspambots
Unauthorized connection attempt detected from IP address 45.136.108.67 to port 3686
2020-05-31 21:19:38
103.52.216.52 attackbots
Unauthorized connection attempt detected from IP address 103.52.216.52 to port 25
2020-05-31 21:44:11

Recently Reported IPs

10.41.79.142 10.43.136.90 10.41.1.161 10.41.127.193
10.44.147.119 10.42.44.111 10.40.96.169 10.43.32.195
10.50.152.38 10.4.82.239 10.4.169.11 10.40.164.89
10.44.183.145 10.4.114.242 10.42.225.242 10.43.188.147
10.41.144.48 10.37.46.99 10.50.91.245 10.52.38.67