Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.81.107.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14926
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;18.81.107.242.			IN	A

;; AUTHORITY SECTION:
.			120	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122200 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Dec 22 21:41:08 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 242.107.81.18.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.136, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.138
Address:	100.100.2.138#53

** server can't find 242.107.81.18.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
84.38.180.61 attackbots
Bruteforce detected by fail2ban
2020-09-30 22:46:14
167.248.133.29 attack
 TCP (SYN) 167.248.133.29:8483 -> port 143, len 44
2020-09-30 23:00:54
108.190.31.236 attackspam
Automatic report - Banned IP Access
2020-09-30 22:27:12
62.76.229.231 attack
Another Russian spambot, contact form spamming
2020-09-30 22:51:49
217.59.215.82 attack
Unauthorised access (Sep 29) SRC=217.59.215.82 LEN=52 TTL=116 ID=24513 DF TCP DPT=445 WINDOW=8192 SYN
2020-09-30 22:44:44
161.35.2.88 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-09-30 22:25:26
187.107.68.86 attackbots
Bruteforce detected by fail2ban
2020-09-30 22:35:08
192.241.237.210 attackspambots
 TCP (SYN) 192.241.237.210:44877 -> port 389, len 44
2020-09-30 22:39:09
218.5.40.107 attack
Shield has blocked a page visit to your site.
Log details for this visitor are below:
- IP Address: 218.5.40.107
- Page parameter failed firewall check. The offending parameter was "z0" with a value of "QGluaV9zZXQoImRpc3BsYXlfZXJyb3JzIiwiMCIpO0BzZXRfdGltZV9saW1pdCgwKTtAc2V0X21hZ2ljX3F1b3Rlc19ydW50aW1lKDApO2VjaG8oIi0+fCIpOztwcmludCgiaGFvcmVuZ2UuY29tUVEzMTcyNzU3MzgiKTs7ZWNobygifDwtIik7ZGllKCk7".
- Firewall Trigger: WordPress Terms.
Note: Email delays are caused by website hosting and email providers.
Time Sent: Wed, 30 Sep 2020 03:33:45 +0000
2020-09-30 22:29:34
117.215.149.114 attackbots
IP 117.215.149.114 attacked honeypot on port: 23 at 9/29/2020 1:36:58 PM
2020-09-30 22:42:26
112.85.42.194 attack
Sep 30 16:29:14 melroy-server sshd[32296]: Failed password for root from 112.85.42.194 port 40162 ssh2
Sep 30 16:29:17 melroy-server sshd[32296]: Failed password for root from 112.85.42.194 port 40162 ssh2
...
2020-09-30 22:38:01
202.98.203.20 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-30 22:59:03
193.239.147.179 attack
Tried to relay mail
2020-09-30 22:34:15
173.245.52.206 attackspam
CMS (WordPress or Joomla) login attempt.
2020-09-30 22:56:46
175.125.121.145 attackbotsspam
failed Imap connection attempt
2020-09-30 22:48:47

Recently Reported IPs

181.185.187.203 111.26.31.50 113.139.123.145 62.240.15.138
115.204.113.93 223.166.128.176 140.206.251.96 27.74.251.18
112.54.98.70 192.144.230.188 44.202.234.105 83.208.253.119
78.95.100.116 109.74.75.55 113.102.242.152 122.51.242.43
87.184.154.254 222.217.118.253 37.109.54.120 161.183.102.35