Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Jamaica

Internet Service Provider: Digicel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
173.225.242.110 attackspam
20/1/30@23:58:10: FAIL: Alarm-Network address from=173.225.242.110
20/1/30@23:58:10: FAIL: Alarm-Network address from=173.225.242.110
...
2020-01-31 14:07:30
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       173.225.240.0 - 173.225.255.255
CIDR:           173.225.240.0/20
NetName:        DIGICEL
NetHandle:      NET-173-225-240-0-1
Parent:         NET173 (NET-173-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Digicel Jamaica (DIGIC-2)
RegDate:        2010-01-26
Updated:        2025-10-30
Ref:            https://rdap.arin.net/registry/ip/173.225.240.0


OrgName:        Digicel Jamaica
OrgId:          DIGIC-2
Address:        14 Ocean Boulevard,
Address:        Kingston
City:           Kingston
StateProv:      
PostalCode:     JAWI
Country:        JM
RegDate:        2003-11-13
Updated:        2020-11-11
Ref:            https://rdap.arin.net/registry/entity/DIGIC-2


OrgAbuseHandle: NETWO1524-ARIN
OrgAbuseName:   Network Administrators
OrgAbusePhone:  +1-876-619-5000 
OrgAbuseEmail:  david.warren@digicelgroup.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NETWO1524-ARIN

OrgTechHandle: NETWO1524-ARIN
OrgTechName:   Network Administrators
OrgTechPhone:  +1-876-619-5000 
OrgTechEmail:  david.warren@digicelgroup.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NETWO1524-ARIN

RNOCHandle: NETWO1524-ARIN
RNOCName:   Network Administrators
RNOCPhone:  +1-876-619-5000 
RNOCEmail:  david.warren@digicelgroup.com
RNOCRef:    https://rdap.arin.net/registry/entity/NETWO1524-ARIN

RTechHandle: NETWO1524-ARIN
RTechName:   Network Administrators
RTechPhone:  +1-876-619-5000 
RTechEmail:  david.warren@digicelgroup.com
RTechRef:    https://rdap.arin.net/registry/entity/NETWO1524-ARIN

RAbuseHandle: NETWO1524-ARIN
RAbuseName:   Network Administrators
RAbusePhone:  +1-876-619-5000 
RAbuseEmail:  david.warren@digicelgroup.com
RAbuseRef:    https://rdap.arin.net/registry/entity/NETWO1524-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 173.225.242.244
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;173.225.242.244.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026020504 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 06 10:13:15 CST 2026
;; MSG SIZE  rcvd: 108
Host info
b'244.242.225.173.in-addr.arpa domain name pointer digijmres-244-242-225-173.digicelbroadband.com.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
244.242.225.173.in-addr.arpa	name = digijmres-244-242-225-173.digicelbroadband.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.55.190.106 attackspambots
Unauthorized connection attempt detected from IP address 45.55.190.106 to port 2220 [J]
2020-02-01 08:56:52
178.62.35.160 attack
Feb  1 00:17:10 dedicated sshd[23473]: Invalid user daniel from 178.62.35.160 port 43502
2020-02-01 08:22:41
129.146.120.113 attackbots
Jan 30 19:22:50 nexus sshd[9312]: Did not receive identification string from 129.146.120.113 port 47108
Jan 30 19:22:53 nexus sshd[9321]: Did not receive identification string from 129.146.120.113 port 49106
Jan 30 19:23:40 nexus sshd[9475]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.120.113  user=r.r
Jan 30 19:23:42 nexus sshd[9475]: Failed password for r.r from 129.146.120.113 port 38146 ssh2
Jan 30 19:23:42 nexus sshd[9475]: Received disconnect from 129.146.120.113 port 38146:11: Normal Shutdown, Thank you for playing [preauth]
Jan 30 19:23:42 nexus sshd[9475]: Disconnected from 129.146.120.113 port 38146 [preauth]
Jan 30 19:23:49 nexus sshd[9506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.120.113  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=129.146.120.113
2020-02-01 08:50:39
175.107.246.4 attack
Unauthorized connection attempt detected from IP address 175.107.246.4 to port 23 [J]
2020-02-01 08:33:56
107.152.164.124 attackspambots
MYH,DEF GET http://meyer-pantalons.be/magmi/web/magmi.php
2020-02-01 08:41:54
5.248.20.133 attack
Unauthorized connection attempt from IP address 5.248.20.133 on Port 445(SMB)
2020-02-01 08:35:31
134.209.5.43 attackbots
Automatic report - Banned IP Access
2020-02-01 08:58:26
122.227.230.11 attack
Unauthorized connection attempt detected from IP address 122.227.230.11 to port 22
2020-02-01 08:56:09
217.182.193.196 attackbots
Automatic report - Port Scan
2020-02-01 08:37:42
201.242.98.240 attack
1433/tcp
[2020-01-31]1pkt
2020-02-01 08:35:13
180.76.242.171 attackbotsspam
Jan 31 04:37:30 XXX sshd[46843]: Invalid user uttar from 180.76.242.171 port 50378
2020-02-01 08:58:00
187.59.9.234 attackspam
Automatic report - Port Scan Attack
2020-02-01 08:40:16
200.44.234.5 attackspambots
Unauthorized connection attempt from IP address 200.44.234.5 on Port 445(SMB)
2020-02-01 08:54:19
34.89.111.21 attackspambots
Feb  1 03:04:46 server sshd\[19888\]: Invalid user alex from 34.89.111.21
Feb  1 03:04:46 server sshd\[19888\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=21.111.89.34.bc.googleusercontent.com 
Feb  1 03:04:48 server sshd\[19888\]: Failed password for invalid user alex from 34.89.111.21 port 53456 ssh2
Feb  1 03:26:29 server sshd\[24752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=21.111.89.34.bc.googleusercontent.com  user=root
Feb  1 03:26:31 server sshd\[24752\]: Failed password for root from 34.89.111.21 port 32786 ssh2
...
2020-02-01 08:49:00
35.154.215.67 attackbotsspam
Unauthorized connection attempt detected from IP address 35.154.215.67 to port 2220 [J]
2020-02-01 08:46:22

Recently Reported IPs

216.234.140.59 14.212.55.66 34.22.151.18 104.152.52.220
110.249.201.12 10.1.224.3 41.38.56.232 162.216.150.199
216.58.217.120 183.165.66.231 138.197.162.136 34.60.107.64
59.88.246.152 61.61.53.229 178.128.226.91 167.71.248.1
159.223.71.126 66.90.98.106 162.216.149.65 49.153.165.66