Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '185.242.3.0 - 185.242.3.255'

% Abuse contact for '185.242.3.0 - 185.242.3.255' is 'abuse@felcloud.net'

inetnum:        185.242.3.0 - 185.242.3.255
org:            ORG-FA1428-RIPE
netname:        Felcloud-24
country:        US
admin-c:        FN3930-RIPE
tech-c:         FN3930-RIPE
status:         ASSIGNED PA
abuse-c:        ACRO60931-RIPE
created:        2026-01-27T11:29:35Z
last-modified:  2026-01-27T11:31:11Z
source:         RIPE
mnt-by:         FELCLOUDNET-MNT

organisation:   ORG-FA1428-RIPE
org-name:       Felcloud
org-type:       OTHER
address:        1314 Ogden St Philadelphia, PA 19123 US
country:        US
abuse-c:        ACRO60931-RIPE
mnt-ref:        DEMENIN-MNT
created:        2026-01-22T21:04:17Z
last-modified:  2026-01-22T21:04:17Z
source:         RIPE # Filtered
mnt-by:         FELCLOUDNET-MNT

role:           FELCLOUD NOC
address:        1314 Ogden St Philadelphia, PA 19123 US
nic-hdl:        FN3930-RIPE
mnt-by:         FELCLOUDNET-MNT
created:        2026-01-22T20:57:51Z
last-modified:  2026-01-22T20:57:51Z
source:         RIPE # Filtered

% Information related to '185.242.3.0/24AS60223'

route:          185.242.3.0/24
origin:         AS60223
created:        2026-01-27T11:30:24Z
last-modified:  2026-01-27T11:30:39Z
source:         RIPE
mnt-by:         FELCLOUDNET-MNT

% This query was served by the RIPE Database Query Service version 1.121.2 (DEXTER)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 185.242.3.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35999
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;185.242.3.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042500 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 25 22:00:54 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 48.3.242.185.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.3.242.185.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.28.95.94 attackspam
SSH bruteforce
2019-12-26 00:28:59
92.222.88.102 attack
Dec 25 12:57:38 vps46666688 sshd[19103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.222.88.102
Dec 25 12:57:40 vps46666688 sshd[19103]: Failed password for invalid user apache from 92.222.88.102 port 32962 ssh2
...
2019-12-26 00:17:00
13.235.17.107 attackspam
LGS,WP GET /wp-login.php
2019-12-26 00:19:49
202.90.198.213 attackspam
1577285719 - 12/25/2019 15:55:19 Host: 202.90.198.213/202.90.198.213 Port: 22 TCP Blocked
2019-12-26 00:28:04
198.143.33.24 attack
404 NOT FOUND
2019-12-26 00:37:52
114.231.217.192 attackspambots
port scan and connect, tcp 23 (telnet)
2019-12-26 00:31:38
139.155.50.40 attackspam
Dec 25 17:12:31 163-172-32-151 sshd[6051]: Invalid user up from 139.155.50.40 port 49408
...
2019-12-26 00:30:22
119.29.152.172 attackbots
$f2bV_matches
2019-12-26 00:47:59
156.201.74.70 attack
SMTP-SASL bruteforce attempt
2019-12-26 00:47:10
220.171.105.34 attackbots
Dec 25 17:19:57 vps691689 sshd[16280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.171.105.34
Dec 25 17:19:59 vps691689 sshd[16280]: Failed password for invalid user yangbin from 220.171.105.34 port 35994 ssh2
...
2019-12-26 00:27:44
112.170.72.170 attackbots
Dec 25 17:08:35 51-15-180-239 sshd[25526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.170.72.170  user=games
Dec 25 17:08:37 51-15-180-239 sshd[25526]: Failed password for games from 112.170.72.170 port 42686 ssh2
...
2019-12-26 00:27:10
45.136.108.116 attackspambots
Dec 25 16:45:47 debian-2gb-nbg1-2 kernel: \[941480.948505\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.136.108.116 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=25822 PROTO=TCP SPT=50497 DPT=19291 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-26 00:31:55
106.54.112.173 attackbots
Dec 25 15:50:33 MK-Soft-VM7 sshd[8603]: Failed password for root from 106.54.112.173 port 53828 ssh2
...
2019-12-26 00:16:27
185.2.4.37 attackspambots
404 NOT FOUND
2019-12-26 00:43:25
213.147.113.131 attackspam
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2019-12-26 00:10:52

Recently Reported IPs

45.142.154.103 192.175.111.232 123.14.90.33 2606:4700:10::6814:8913
8.36.72.235 123.51.239.160 148.135.115.106 66.132.172.142
2606:4700:10::6814:6592 2606:4700:10::6814:5595 2606:4700:10::6814:6229 2606:4700:10::6816:1155
88.101.166.136 43.239.95.46 2606:4700:10::6816:700 2606:4700:10::6814:6904
2606:4700:10::6816:1469 66.132.195.73 180.194.89.199 37.163.98.21