Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       169.242.0.0 - 169.242.255.255
CIDR:           169.242.0.0/16
NetName:        BAC-169-242-0-0-1
NetHandle:      NET-169-242-0-0-1
Parent:         NET169 (NET-169-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Bank of America, National Association (BANKOF-2)
RegDate:        1995-10-05
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/169.242.0.0


OrgName:        Bank of America, National Association
OrgId:          BANKOF-2
Address:        Bank of America Corporation
Address:        100 North Tryon Street
City:           Charlotte
StateProv:      NC
PostalCode:     28255
Country:        US
RegDate:        1992-01-06
Updated:        2024-11-25
Comment:        For abuse issues contact abuse@bankofamerica.com
Ref:            https://rdap.arin.net/registry/entity/BANKOF-2


OrgAbuseHandle: ABUSE608-ARIN
OrgAbuseName:   ABUSE
OrgAbusePhone:  +1-704-386-5000 
OrgAbuseEmail:  ABUSE@bankofamerica.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/ABUSE608-ARIN

OrgTechHandle: ZB29-ARIN
OrgTechName:   HOSTMASTER
OrgTechPhone:  +1-563-549-8798 
OrgTechEmail:  patrick.ohagerty@bofa.com
OrgTechRef:    https://rdap.arin.net/registry/entity/ZB29-ARIN

OrgTechHandle: LAU-ARIN
OrgTechName:   Uribarri, Luis Alfonso
OrgTechPhone:  +1-646-556-2742 
OrgTechEmail:  luis.a.uribarri@bofa.com
OrgTechRef:    https://rdap.arin.net/registry/entity/LAU-ARIN

OrgTechHandle: SPD3-ARIN
OrgTechName:   Dornan, Sean Patrick
OrgTechPhone:  +1-586-273-1444 
OrgTechEmail:  sean.dornan@bofa.com
OrgTechRef:    https://rdap.arin.net/registry/entity/SPD3-ARIN

OrgNOCHandle: ZB29-ARIN
OrgNOCName:   HOSTMASTER
OrgNOCPhone:  +1-563-549-8798 
OrgNOCEmail:  patrick.ohagerty@bofa.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/ZB29-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.242.73.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2859
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.242.73.82.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026051500 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 15 21:56:12 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 82.73.242.169.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 169.242.73.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
46.12.254.166 attackspam
Honeypot attack, port: 5555, PTR: 46.12.254.166.dsl.dyn.forthnet.gr.
2020-02-20 09:51:52
105.235.28.90 attackspam
Feb 20 01:02:09 h1745522 sshd[18343]: Invalid user user from 105.235.28.90 port 42621
Feb 20 01:02:09 h1745522 sshd[18343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.235.28.90
Feb 20 01:02:09 h1745522 sshd[18343]: Invalid user user from 105.235.28.90 port 42621
Feb 20 01:02:11 h1745522 sshd[18343]: Failed password for invalid user user from 105.235.28.90 port 42621 ssh2
Feb 20 01:05:01 h1745522 sshd[29967]: Invalid user amandabackup from 105.235.28.90 port 54848
Feb 20 01:05:01 h1745522 sshd[29967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.235.28.90
Feb 20 01:05:01 h1745522 sshd[29967]: Invalid user amandabackup from 105.235.28.90 port 54848
Feb 20 01:05:03 h1745522 sshd[29967]: Failed password for invalid user amandabackup from 105.235.28.90 port 54848 ssh2
Feb 20 01:07:48 h1745522 sshd[14838]: Invalid user user from 105.235.28.90 port 38846
...
2020-02-20 09:29:28
91.215.88.171 attack
Feb 20 01:54:37  sshd\[13162\]: Invalid user robert from 91.215.88.171Feb 20 01:54:40  sshd\[13162\]: Failed password for invalid user robert from 91.215.88.171 port 49256 ssh2
...
2020-02-20 09:52:30
222.186.42.155 attackspam
Feb 19 22:37:46 firewall sshd[12923]: Failed password for root from 222.186.42.155 port 54266 ssh2
Feb 19 22:37:48 firewall sshd[12923]: Failed password for root from 222.186.42.155 port 54266 ssh2
Feb 19 22:37:51 firewall sshd[12923]: Failed password for root from 222.186.42.155 port 54266 ssh2
...
2020-02-20 09:52:56
120.31.160.66 attack
Honeypot attack, port: 445, PTR: ns1.eflydns.net.
2020-02-20 09:53:21
43.249.224.149 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-20 09:48:00
43.248.123.33 attackspambots
Automatic report - SSH Brute-Force Attack
2020-02-20 09:24:15
78.160.33.166 attackbotsspam
Automatic report - Port Scan Attack
2020-02-20 09:32:32
178.169.87.223 attack
Portscan detected
2020-02-20 09:55:25
100.0.240.94 attackbotsspam
Honeypot attack, port: 445, PTR: pool-100-0-240-94.bstnma.fios.verizon.net.
2020-02-20 09:45:47
81.250.191.173 attackbotsspam
Automatic report - Banned IP Access
2020-02-20 09:19:56
218.149.221.136 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-20 09:37:30
119.27.166.181 attackspam
Feb 20 02:15:20 sd-53420 sshd\[15157\]: Invalid user speech-dispatcher from 119.27.166.181
Feb 20 02:15:20 sd-53420 sshd\[15157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.166.181
Feb 20 02:15:22 sd-53420 sshd\[15157\]: Failed password for invalid user speech-dispatcher from 119.27.166.181 port 51852 ssh2
Feb 20 02:17:58 sd-53420 sshd\[15375\]: User list from 119.27.166.181 not allowed because none of user's groups are listed in AllowGroups
Feb 20 02:17:58 sd-53420 sshd\[15375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.27.166.181  user=list
...
2020-02-20 09:29:13
92.222.78.178 attackbotsspam
Feb 20 02:14:08 SilenceServices sshd[12411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.78.178
Feb 20 02:14:10 SilenceServices sshd[12411]: Failed password for invalid user hadoop from 92.222.78.178 port 56176 ssh2
Feb 20 02:16:56 SilenceServices sshd[14876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.78.178
2020-02-20 09:26:28
180.241.228.21 attackspam
Port probing on unauthorized port 1433
2020-02-20 09:43:12

Recently Reported IPs

185.247.137.21 82.157.207.171 77.91.118.50 39.98.61.85
2606:4700:10::6814:4696 2606:4700:10::6816:4107 192.168.43.200 160.211.41.208
159.149.163.25 141.176.56.116 137.118.201.35 57.141.2.56
121.129.137.231 12.172.72.20 192.168.66.1 103.137.215.85
141.223.126.34 128.119.193.16 172.235.36.197 89.21.67.177