Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.1.83.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64885
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.1.83.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 23:38:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 242.83.1.158.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 158.1.83.242.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
122.51.42.182 attack
prod6
...
2020-05-12 13:25:13
118.25.18.30 attack
Invalid user jonah from 118.25.18.30 port 51720
2020-05-12 14:12:51
49.235.133.208 attackspam
2020-05-11T22:55:55.789160linuxbox-skyline sshd[107237]: Invalid user spectre from 49.235.133.208 port 45581
...
2020-05-12 13:42:37
175.24.36.114 attackspam
May 12 07:05:10 legacy sshd[31171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.24.36.114
May 12 07:05:12 legacy sshd[31171]: Failed password for invalid user usrdata from 175.24.36.114 port 35394 ssh2
May 12 07:10:43 legacy sshd[31425]: Failed password for root from 175.24.36.114 port 35930 ssh2
...
2020-05-12 13:26:11
14.177.250.20 attackbots
Port probing on unauthorized port 445
2020-05-12 14:15:10
37.49.226.40 attackspam
May 12 07:02:02 debian-2gb-nbg1-2 kernel: \[11518586.731219\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=37.49.226.40 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=434 PROTO=TCP SPT=59427 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-12 13:57:01
122.51.193.205 attackbotsspam
May 12 07:08:33 vps647732 sshd[22227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.193.205
May 12 07:08:35 vps647732 sshd[22227]: Failed password for invalid user adminview from 122.51.193.205 port 54352 ssh2
...
2020-05-12 14:17:07
77.247.108.15 attackbotsspam
May 12 07:41:47 debian-2gb-nbg1-2 kernel: \[11520971.136980\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=77.247.108.15 DST=195.201.40.59 LEN=40 TOS=0x08 PREC=0x20 TTL=242 ID=43970 PROTO=TCP SPT=47424 DPT=473 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-12 13:46:58
139.194.166.161 attack
Connection by 139.194.166.161 on port: 139 got caught by honeypot at 5/12/2020 4:53:04 AM
2020-05-12 14:07:32
179.99.42.105 attack
port 23
2020-05-12 13:27:18
212.129.36.98 spam
info@jalone.orkasswas.com wich resend to
http://whosequal.com/redirssect.html?od=1syl5eb9b2fda0bdd_vl_bestvl_vx1.zzmn7y.U0000rfufqyxe9013_xf1149.fufqyMThvZDdxLTNhODI5MTY0d18rR

orkasswas.com and whosequal.com FALSE EMPTY Web Sites created ONLY for SPAM, PHISHING and SCAM !

namecheap.com and online.net are registrar to STOP activity IMMEDIATELY too !

orkasswas.com hosted in French country, so 750 € to pay per EACH SPAM... 

orkasswas.com => namecheap.com
orkasswas.com => 212.129.36.98
orkasswas.com => khadijaka715@gmail.com
212.129.36.98 => online.net

whosequal.com => namecheap.com
whosequal.com => 74.124.199.154
whosequal.com => khadijaka715@gmail.com
74.124.199.154 => corporatecolo.com

https://www.mywot.com/scorecard/orkasswas.com
https://www.mywot.com/scorecard/whosequal.com
https://www.mywot.com/scorecard/namecheap.com

https://en.asytech.cn/check-ip/212.129.36.98
https://en.asytech.cn/check-ip/74.124.199.154
2020-05-12 13:40:46
187.0.160.130 attackspam
Invalid user admin from 187.0.160.130 port 38586
2020-05-12 13:46:26
185.232.65.24 attack
May 12 05:53:39 debian-2gb-nbg1-2 kernel: \[11514483.411761\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.232.65.24 DST=195.201.40.59 LEN=81 TOS=0x00 PREC=0x00 TTL=246 ID=54321 PROTO=UDP SPT=33354 DPT=389 LEN=61
2020-05-12 13:44:58
74.124.199.154 spam
info@jalone.orkasswas.com wich resend to
http://whosequal.com/redirssect.html?od=1syl5eb9b2fda0bdd_vl_bestvl_vx1.zzmn7y.U0000rfufqyxe9013_xf1149.fufqyMThvZDdxLTNhODI5MTY0d18rR

orkasswas.com and whosequal.com FALSE EMPTY Web Sites created ONLY for SPAM, PHISHING and SCAM !

namecheap.com and online.net are registrar to STOP activity IMMEDIATELY too !

orkasswas.com hosted in French country, so 750 € to pay per EACH SPAM... 

orkasswas.com => namecheap.com
orkasswas.com => 212.129.36.98
orkasswas.com => khadijaka715@gmail.com
212.129.36.98 => online.net

whosequal.com => namecheap.com
whosequal.com => 74.124.199.154
whosequal.com => khadijaka715@gmail.com
74.124.199.154 => corporatecolo.com

https://www.mywot.com/scorecard/orkasswas.com
https://www.mywot.com/scorecard/whosequal.com
https://www.mywot.com/scorecard/namecheap.com

https://en.asytech.cn/check-ip/212.129.36.98
https://en.asytech.cn/check-ip/74.124.199.154
2020-05-12 13:41:10
151.80.21.61 attack
CMS (WordPress or Joomla) login attempt.
2020-05-12 13:44:04

Recently Reported IPs

243.18.181.102 24.182.88.171 206.204.44.96 149.57.136.170
77.95.217.91 137.63.130.99 177.47.251.110 49.223.99.84
15.177.253.158 252.188.6.19 32.212.221.4 22.251.59.99
40.165.126.227 84.84.33.214 153.140.31.42 35.208.145.195
248.158.192.9 251.184.11.139 90.224.30.52 84.198.110.8