Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 132.226.104.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1320
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;132.226.104.242.		IN	A

;; AUTHORITY SECTION:
.			116	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061500 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 15 13:28:48 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 242.104.226.132.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.104.226.132.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
102.176.244.77 attackspam
Email rejected due to spam filtering
2020-01-27 08:51:08
61.247.59.30 attackbotsspam
Email rejected due to spam filtering
2020-01-27 09:24:13
81.171.107.188 attackbotsspam
[2020-01-26 19:27:27] NOTICE[1148] chan_sip.c: Registration from '' failed for '81.171.107.188:52660' - Wrong password
[2020-01-26 19:27:27] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-26T19:27:27.217-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="3418",SessionID="0x7fd82c10ad58",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.107.188/52660",Challenge="4670c1e9",ReceivedChallenge="4670c1e9",ReceivedHash="532aa0a884a6214e0564894400d5d3f2"
[2020-01-26 19:27:55] NOTICE[1148] chan_sip.c: Registration from '' failed for '81.171.107.188:60681' - Wrong password
[2020-01-26 19:27:55] SECURITY[1163] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-01-26T19:27:55.224-0500",Severity="Error",Service="SIP",EventVersion="2",AccountID="5923",SessionID="0x7fd82c538db8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/81.171.107
...
2020-01-27 08:53:24
156.96.113.121 attackspambots
Jan 26 19:10:19 mxgate1 postfix/postscreen[13050]: CONNECT from [156.96.113.121]:51094 to [176.31.12.44]:25
Jan 26 19:10:19 mxgate1 postfix/dnsblog[13054]: addr 156.96.113.121 listed by domain zen.spamhaus.org as 127.0.0.9
Jan 26 19:10:19 mxgate1 postfix/dnsblog[13054]: addr 156.96.113.121 listed by domain zen.spamhaus.org as 127.0.0.2
Jan 26 19:10:19 mxgate1 postfix/dnsblog[13054]: addr 156.96.113.121 listed by domain zen.spamhaus.org as 127.0.0.3
Jan 26 19:10:19 mxgate1 postfix/dnsblog[13054]: addr 156.96.113.121 listed by domain zen.spamhaus.org as 127.0.0.4
Jan 26 19:10:19 mxgate1 postfix/dnsblog[13054]: addr 156.96.113.121 listed by domain zen.spamhaus.org as 127.0.0.10
Jan 26 19:10:19 mxgate1 postfix/dnsblog[13053]: addr 156.96.113.121 listed by domain cbl.abuseat.org as 127.0.0.2
Jan 26 19:10:19 mxgate1 postfix/postscreen[13050]: PREGREET 24 after 0.09 from [156.96.113.121]:51094: HELO mxgate1.1awww.com

Jan 26 19:10:20 mxgate1 postfix/postscreen[13050]: DNSBL ra........
-------------------------------
2020-01-27 09:27:53
107.150.4.146 attack
Jan 26 20:12:32 grey postfix/smtpd\[16755\]: NOQUEUE: reject: RCPT from unknown\[107.150.4.146\]: 554 5.7.1 Service unavailable\; Client host \[107.150.4.146\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[107.150.4.146\]\; from=\<6245-45-327424-1416-feher.eszter=kybest.hu@mail.buamizing.xyz\> to=\ proto=ESMTP helo=\
...
2020-01-27 09:29:52
142.44.247.190 attackspam
Jan 26 20:45:37 sd-53420 sshd\[12082\]: Invalid user webmaster from 142.44.247.190
Jan 26 20:45:37 sd-53420 sshd\[12082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.247.190
Jan 26 20:45:39 sd-53420 sshd\[12082\]: Failed password for invalid user webmaster from 142.44.247.190 port 58724 ssh2
Jan 26 20:45:49 sd-53420 sshd\[12125\]: Invalid user webmaster from 142.44.247.190
Jan 26 20:45:49 sd-53420 sshd\[12125\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.247.190
...
2020-01-27 09:01:54
78.3.76.192 attackbotsspam
TCP Port: 25      invalid blocked  abuseat-org also barracuda and spamcop           (519)
2020-01-27 08:52:21
39.32.161.123 attackspam
Email rejected due to spam filtering
2020-01-27 09:25:08
185.94.111.1 attackspambots
firewall-block, port(s): 17/udp, 19/udp, 389/udp
2020-01-27 09:16:15
52.237.8.15 attackbots
Unauthorized connection attempt detected from IP address 52.237.8.15 to port 2220 [J]
2020-01-27 09:04:45
220.191.208.204 attack
$f2bV_matches
2020-01-27 09:27:26
39.63.15.116 attackbotsspam
Email rejected due to spam filtering
2020-01-27 09:15:48
39.42.131.133 attackbots
TCP Port: 25      invalid blocked  abuseat-org also barracuda and spamcop           (509)
2020-01-27 09:27:06
117.50.43.236 attackspam
Unauthorized connection attempt detected from IP address 117.50.43.236 to port 2220 [J]
2020-01-27 09:16:37
150.109.107.66 attack
Unauthorized connection attempt detected from IP address 150.109.107.66 to port 2220 [J]
2020-01-27 09:08:41

Recently Reported IPs

169.229.148.86 45.7.49.54 45.7.230.151 49.84.170.226
45.32.1.70 66.105.22.203 2.188.175.254 45.39.255.99
45.43.71.78 45.32.226.90 45.43.63.199 45.43.71.27
45.43.222.33 45.4.173.194 216.156.37.69 23.236.236.176
23.236.217.164 177.18.112.146 190.152.23.217 169.229.164.239