Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.234.242.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63193
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.234.242.48.			IN	A

;; AUTHORITY SECTION:
.			347	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023102100 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 21 20:24:45 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 48.242.234.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.242.234.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.227.254.30 attackbotsspam
scans 10 times in preceeding hours on the ports (in chronological order) 9006 33389 7500 24188 12345 48888 11047 48888 13389 18303
2020-03-27 18:36:20
192.241.235.236 attack
Unauthorized connection attempt detected from IP address 192.241.235.236 to port 992
2020-03-27 18:10:05
92.118.37.91 attack
scans once in preceeding hours on the ports (in chronological order) 7547 resulting in total of 81 scans from 92.118.37.0/24 block.
2020-03-27 19:02:01
162.243.131.129 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-27 18:20:44
119.249.54.162 attackbots
SIP/5060 Probe, BF, Hack -
2020-03-27 18:25:37
80.82.64.146 attack
Mar 27 10:15:50 debian-2gb-nbg1-2 kernel: \[7559622.104197\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.64.146 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=10187 PROTO=TCP SPT=40336 DPT=3390 WINDOW=1024 RES=0x00 SYN URGP=0
2020-03-27 18:31:56
92.118.37.99 attack
03/27/2020-06:56:55.164997 92.118.37.99 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-27 19:01:32
65.19.174.198 attackbots
SIP/5060 Probe, BF, Hack -
2020-03-27 17:54:36
89.144.47.246 attack
scans 2 times in preceeding hours on the ports (in chronological order) 3389 3389
2020-03-27 18:29:50
162.243.130.216 attack
8022/tcp 18369/tcp 44818/tcp...
[2020-03-14/26]12pkt,10pt.(tcp),1pt.(udp)
2020-03-27 18:21:24
45.143.220.33 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-27 17:56:15
172.104.242.173 attackspambots
port scan and connect, tcp 80 (http)
2020-03-27 18:57:21
185.176.27.14 attackspam
scans 19 times in preceeding hours on the ports (in chronological order) 8500 8596 8595 8687 8780 8781 8782 8880 8881 9091 9089 9183 9200 9199 9295 9297 9296 9390 9389 resulting in total of 218 scans from 185.176.27.0/24 block.
2020-03-27 18:49:19
176.113.115.43 attack
Fail2Ban Ban Triggered
2020-03-27 18:18:13
185.176.27.102 attack
03/27/2020-06:41:01.660187 185.176.27.102 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-27 18:46:19

Recently Reported IPs

102.235.209.144 102.234.79.246 102.235.125.214 102.235.231.125
102.235.212.157 102.235.240.123 102.235.251.116 102.235.230.145
102.234.54.56 102.234.73.1 102.234.44.136 102.235.201.188
102.234.37.194 102.236.138.137 102.235.236.55 102.234.43.139
102.235.227.59 102.234.18.58 102.235.35.252 102.234.213.107