Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.42.204.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28204
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.42.204.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 17:30:58 CST 2025
;; MSG SIZE  rcvd: 107
Host info
242.204.42.136.in-addr.arpa domain name pointer 136-42-204-242.googlefiber.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.204.42.136.in-addr.arpa	name = 136-42-204-242.googlefiber.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.179.177.91 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-05-02 14:07:59
60.160.225.39 attack
Repeated brute force against a port
2020-05-02 14:11:56
218.92.0.175 attack
May  2 12:26:52 webhost01 sshd[18283]: Failed password for root from 218.92.0.175 port 26116 ssh2
May  2 12:27:04 webhost01 sshd[18283]: error: maximum authentication attempts exceeded for root from 218.92.0.175 port 26116 ssh2 [preauth]
...
2020-05-02 13:51:04
138.197.151.213 attack
Wordpress malicious attack:[sshd]
2020-05-02 13:28:59
157.100.53.94 attackbotsspam
Invalid user roundcube from 157.100.53.94 port 51816
2020-05-02 13:56:54
51.77.226.68 attackspambots
Invalid user user from 51.77.226.68 port 38734
2020-05-02 14:05:21
218.92.0.179 attack
May  2 12:46:51 webhost01 sshd[18727]: Failed password for root from 218.92.0.179 port 53857 ssh2
May  2 12:47:04 webhost01 sshd[18727]: error: maximum authentication attempts exceeded for root from 218.92.0.179 port 53857 ssh2 [preauth]
...
2020-05-02 13:58:45
106.13.147.89 attackbots
May  2 07:25:39 OPSO sshd\[16827\]: Invalid user all from 106.13.147.89 port 34162
May  2 07:25:39 OPSO sshd\[16827\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.89
May  2 07:25:42 OPSO sshd\[16827\]: Failed password for invalid user all from 106.13.147.89 port 34162 ssh2
May  2 07:28:47 OPSO sshd\[17491\]: Invalid user jira from 106.13.147.89 port 46330
May  2 07:28:47 OPSO sshd\[17491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.89
2020-05-02 13:42:36
190.186.115.172 attackbots
Automatic report - Port Scan Attack
2020-05-02 13:46:22
113.169.129.157 attack
1588391749 - 05/02/2020 05:55:49 Host: 113.169.129.157/113.169.129.157 Port: 445 TCP Blocked
2020-05-02 14:15:18
68.183.129.210 attackbots
2020-05-02T05:56:16.667559rocketchat.forhosting.nl sshd[9693]: Failed password for root from 68.183.129.210 port 48904 ssh2
2020-05-02T06:01:18.889118rocketchat.forhosting.nl sshd[9758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.129.210  user=root
2020-05-02T06:01:20.697447rocketchat.forhosting.nl sshd[9758]: Failed password for root from 68.183.129.210 port 60490 ssh2
...
2020-05-02 13:50:38
36.7.159.235 attack
May  2 05:39:48 server sshd[43486]: Failed password for invalid user ftp from 36.7.159.235 port 60230 ssh2
May  2 05:45:16 server sshd[47844]: Failed password for invalid user testing1 from 36.7.159.235 port 51353 ssh2
May  2 05:56:04 server sshd[55554]: Failed password for invalid user german from 36.7.159.235 port 44721 ssh2
2020-05-02 14:05:37
201.69.28.75 attack
Invalid user sc from 201.69.28.75 port 51328
2020-05-02 13:30:16
104.248.182.179 attackbotsspam
Invalid user ehsan from 104.248.182.179 port 49596
2020-05-02 13:27:44
35.221.191.46 attackbots
20 attempts against mh-ssh on echoip
2020-05-02 13:40:35

Recently Reported IPs

18.173.188.49 60.177.78.21 147.87.184.165 101.24.51.15
220.74.60.54 6.18.191.3 163.84.164.117 230.255.182.16
255.75.186.197 51.133.12.235 62.200.194.23 98.104.117.151
164.206.71.93 109.233.2.52 117.153.135.37 45.254.233.194
147.88.56.100 2.205.7.24 243.250.216.203 136.207.94.15