Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Egypt

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.42.120.249
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52423
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;102.42.120.249.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071602 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jul 17 02:34:00 CST 2020
;; MSG SIZE  rcvd: 118
Host info
249.120.42.102.in-addr.arpa domain name pointer host-102.42.120.249.tedata.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
249.120.42.102.in-addr.arpa	name = host-102.42.120.249.tedata.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.89.165.245 attackbots
Sep 17 05:29:00 markkoudstaal sshd[16055]: Failed password for root from 118.89.165.245 port 33116 ssh2
Sep 17 05:33:45 markkoudstaal sshd[16502]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.165.245
Sep 17 05:33:46 markkoudstaal sshd[16502]: Failed password for invalid user rofl from 118.89.165.245 port 52328 ssh2
2019-09-17 18:19:37
123.16.233.214 attackspambots
Unauthorized connection attempt from IP address 123.16.233.214 on Port 445(SMB)
2019-09-17 18:46:26
2.89.152.4 attackspambots
Unauthorized connection attempt from IP address 2.89.152.4 on Port 445(SMB)
2019-09-17 18:26:11
58.171.108.172 attackspambots
Sep 17 11:20:30 eventyay sshd[19239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.171.108.172
Sep 17 11:20:33 eventyay sshd[19239]: Failed password for invalid user wei from 58.171.108.172 port 61737 ssh2
Sep 17 11:26:01 eventyay sshd[19334]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.171.108.172
...
2019-09-17 17:29:14
180.241.145.152 attack
Unauthorized connection attempt from IP address 180.241.145.152 on Port 445(SMB)
2019-09-17 18:02:39
103.242.56.63 attack
Unauthorized connection attempt from IP address 103.242.56.63 on Port 445(SMB)
2019-09-17 18:50:14
14.253.91.18 attackbotsspam
Unauthorized connection attempt from IP address 14.253.91.18 on Port 445(SMB)
2019-09-17 18:46:45
42.119.100.140 attackbotsspam
Unauthorized connection attempt from IP address 42.119.100.140 on Port 445(SMB)
2019-09-17 18:28:27
81.28.163.250 attackbots
Unauthorized connection attempt from IP address 81.28.163.250 on Port 445(SMB)
2019-09-17 18:45:30
116.31.105.149 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/116.31.105.149/ 
 CN - 1H : (304)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN134764 
 
 IP : 116.31.105.149 
 
 CIDR : 116.31.96.0/19 
 
 PREFIX COUNT : 144 
 
 UNIQUE IP COUNT : 177920 
 
 
 WYKRYTE ATAKI Z ASN134764 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 INFO : SYN Flood DDoS Attack Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery
2019-09-17 18:28:10
60.247.54.2 attack
Sep 17 05:11:47 ny01 sshd[20626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.247.54.2
Sep 17 05:11:50 ny01 sshd[20626]: Failed password for invalid user kenyan from 60.247.54.2 port 21539 ssh2
Sep 17 05:20:44 ny01 sshd[22353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.247.54.2
2019-09-17 17:40:16
106.51.140.15 attack
Sep 17 08:03:06 dedicated sshd[4040]: Invalid user gscdn123 from 106.51.140.15 port 23890
2019-09-17 18:45:12
49.235.91.152 attack
Sep 16 20:29:26 web1 sshd\[4365\]: Invalid user pi from 49.235.91.152
Sep 16 20:29:26 web1 sshd\[4365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.91.152
Sep 16 20:29:28 web1 sshd\[4365\]: Failed password for invalid user pi from 49.235.91.152 port 32920 ssh2
Sep 16 20:33:47 web1 sshd\[4786\]: Invalid user virgin from 49.235.91.152
Sep 16 20:33:47 web1 sshd\[4786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.91.152
2019-09-17 17:28:25
115.79.5.206 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-17 05:39:24,915 INFO [amun_request_handler] PortScan Detected on Port: 445 (115.79.5.206)
2019-09-17 18:07:19
87.241.236.78 attackspambots
LGS,WP GET /wp-login.php
2019-09-17 17:47:32

Recently Reported IPs

185.147.99.57 110.97.149.48 78.136.155.212 176.179.63.141
185.220.101.130 191.140.4.33 30.24.3.164 179.158.123.97
230.225.70.229 180.243.252.225 125.94.149.104 66.7.101.142
79.124.62.122 177.11.62.8 211.239.91.213 165.227.32.232
193.62.90.69 176.178.191.178 237.169.41.29 132.97.238.129