Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 19.157.108.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17058
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;19.157.108.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031601 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 17 10:03:45 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 242.108.157.19.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.108.157.19.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.72.23.181 attackbots
Automatic report - XMLRPC Attack
2020-01-04 16:32:16
54.90.13.18 attack
$f2bV_matches
2020-01-04 16:17:27
94.244.138.21 attackspambots
scan z
2020-01-04 16:15:25
103.143.13.7 attackbots
20/1/3@23:50:48: FAIL: IoT-Telnet address from=103.143.13.7
...
2020-01-04 16:33:47
60.247.36.100 attackspam
$f2bV_matches
2020-01-04 16:02:43
42.123.99.67 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-01-04 16:25:39
49.88.112.113 attackbotsspam
Repeated brute force against a port
2020-01-04 16:14:24
113.176.82.140 attackspam
20/1/3@23:51:54: FAIL: Alarm-Network address from=113.176.82.140
20/1/3@23:51:54: FAIL: Alarm-Network address from=113.176.82.140
...
2020-01-04 16:06:18
198.98.52.141 attackspam
Jan  4 09:49:54 ncomp sshd[20952]: Invalid user www from 198.98.52.141
Jan  4 09:49:54 ncomp sshd[20950]: Invalid user hadoop from 198.98.52.141
Jan  4 09:49:54 ncomp sshd[20947]: Invalid user postgres from 198.98.52.141
Jan  4 09:49:54 ncomp sshd[20958]: Invalid user centos from 198.98.52.141
Jan  4 09:49:54 ncomp sshd[20948]: Invalid user teacher from 198.98.52.141
Jan  4 09:49:54 ncomp sshd[20949]: Invalid user admin from 198.98.52.141
Jan  4 09:49:54 ncomp sshd[20957]: Invalid user tester from 198.98.52.141
Jan  4 09:49:54 ncomp sshd[20959]: Invalid user devops from 198.98.52.141
Jan  4 09:49:54 ncomp sshd[20955]: Invalid user studant from 198.98.52.141
Jan  4 09:49:54 ncomp sshd[20954]: Invalid user guest from 198.98.52.141
Jan  4 09:49:54 ncomp sshd[20956]: Invalid user tomcat from 198.98.52.141
Jan  4 09:49:54 ncomp sshd[20953]: Invalid user vsftp from 198.98.52.141
2020-01-04 16:00:55
120.27.22.242 attackspambots
Unauthorized connection attempt detected from IP address 120.27.22.242 to port 23
2020-01-04 16:24:26
94.30.1.188 attackspam
Automatic report - Banned IP Access
2020-01-04 16:05:56
132.232.1.106 attackbots
Invalid user schedulers from 132.232.1.106 port 38532
2020-01-04 16:19:46
36.65.112.219 attackbots
Unauthorized connection attempt detected from IP address 36.65.112.219 to port 445
2020-01-04 16:12:34
140.143.134.86 attack
Jan  4 07:44:31 XXX sshd[23526]: Invalid user shark from 140.143.134.86 port 42835
2020-01-04 16:03:13
119.7.169.241 attack
Fail2Ban - FTP Abuse Attempt
2020-01-04 16:26:02

Recently Reported IPs

30.161.38.167 70.247.46.61 134.246.173.147 85.115.53.201
206.125.223.146 218.102.60.187 51.100.95.209 15.171.223.83
155.54.85.51 95.162.108.190 234.31.33.28 212.246.56.236
255.186.248.102 71.2.187.122 192.63.156.19 19.93.179.93
15.55.106.80 230.239.5.40 248.183.95.21 209.126.208.203