Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
117.242.138.26 attackspambots
" "
2020-03-07 19:57:19
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 117.242.138.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17558
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;117.242.138.133.		IN	A

;; AUTHORITY SECTION:
.			373	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030501 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 06 12:22:16 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 133.138.242.117.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.138.242.117.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.156.73.50 attack
 TCP (SYN) 185.156.73.50:50619 -> port 9999, len 40
2020-05-17 08:35:20
185.156.73.65 attackspam
05/16/2020-20:19:48.150524 185.156.73.65 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-17 08:34:34
66.240.236.119 attackspambots
port scan and connect, tcp 5432 (postgresql)
2020-05-17 08:19:13
185.175.93.27 attackbotsspam
05/16/2020-19:27:20.535004 185.175.93.27 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-17 08:32:39
103.145.12.123 attackspam
 UDP 103.145.12.123:5134 -> port 5088, len 443
2020-05-17 08:42:04
64.227.39.171 attackbots
 TCP (SYN) 64.227.39.171:38231 -> port 23, len 44
2020-05-17 08:19:48
45.143.220.5 attackspambots
Scanned 1 times in the last 24 hours on port 5060
2020-05-17 08:26:56
94.102.50.144 attackspambots
4389/tcp 8389/tcp 2389/tcp...
[2020-04-22/05-16]489pkt,207pt.(tcp)
2020-05-17 08:45:08
209.141.41.138 attackspambots
Scanned 1 times in the last 24 hours on port 22
2020-05-17 08:30:42
193.202.45.202 attack
Scanned 14 times in the last 24 hours on port 5060
2020-05-17 08:31:50
71.6.199.23 attackspambots
Honeypot hit.
2020-05-17 08:17:45
46.101.6.56 attackbots
 TCP (SYN) 46.101.6.56:57636 -> port 22846, len 44
2020-05-17 08:25:43
89.248.172.16 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 82 - port: 5094 proto: UDP cat: Misc Attack
2020-05-17 08:15:31
5.101.0.209 attack
5.101.0.209 - - [17/May/2020:13:29:29 +0800] "POST /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1" 404 599 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
5.101.0.209 - - [17/May/2020:13:29:30 +0800] "GET /vendor/phpunit/phpunit/src/Util/PHP/eval-stdin.php HTTP/1.1" 404 599 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/78.0.3904.108 Safari/537.36"
2020-05-17 15:28:19
103.66.48.38 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 99 - port: 23 proto: TCP cat: Misc Attack
2020-05-17 08:42:38

Recently Reported IPs

117.242.145.103 117.242.132.125 117.242.134.195 117.242.147.1
117.242.147.109 117.242.147.181 117.242.147.133 114.99.22.234
117.242.36.210 117.242.147.237 114.99.22.235 117.242.147.21
114.99.22.236 114.99.22.238 238.98.199.118 114.99.22.24
114.99.22.240 114.99.22.242 114.99.22.243 114.99.22.244