Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tranbjerg

Region: Region Midtjylland

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
% This is the RIPE Database query service.
% The objects are in RPSL format.
%
% The RIPE Database is subject to Terms and Conditions.
% See https://docs.db.ripe.net/terms-conditions.html

% Note: this output has been filtered.
%       To receive output for a database update, use the "-B" flag.

% Information related to '193.242.107.0 - 193.242.107.255'

% Abuse contact for '193.242.107.0 - 193.242.107.255' is 'postmaster@abuse.mail.dk'

inetnum:        193.242.107.0 - 193.242.107.255
netname:        MIT-DK
country:        DK
org:            ORG-MI14-RIPE
admin-c:        AS5071-RIPE
tech-c:         AS5071-RIPE
status:         ASSIGNED PI
mnt-by:         RIPE-NCC-END-MNT
mnt-by:         TDK-MNT
mnt-routes:     TDK-MNT
mnt-routes:     nia-mnt
mnt-domains:    TDK-MNT
created:        2010-09-16T06:57:20Z
last-modified:  2016-04-14T08:23:56Z
source:         RIPE
sponsoring-org: ORG-TD1-RIPE

organisation:   ORG-MI14-RIPE
org-name:       Mariendal El-Teknik A/S
country:        DK
org-type:       other
remarks:        Lars Dreier
address:        Gl. Gugvej 51 DK-9000 Aalborg
phone:          +45 96317792
abuse-c:        AR30166-RIPE
mnt-ref:        TDK-MNT
mnt-by:         TDK-MNT
created:        2007-06-26T11:30:24Z
last-modified:  2022-12-01T16:37:12Z
source:         RIPE # Filtered

role:           AS3292 Staff
address:        TDC A/S
address:        Sletvej 30, 8-062
address:        DK-8310 Tranbjerg
address:        Denmark
remarks:        contact info: http://as3292.peeringdb.com
admin-c:        NCB1-RIPE
admin-c:        MBP137-RIPE
tech-c:         NCB1-RIPE
tech-c:         CP11490-RIPE
tech-c:         MBP137-RIPE
nic-hdl:        AS5071-RIPE
mnt-by:         AS3292-MNT
created:        2002-07-02T13:36:00Z
last-modified:  2024-05-21T09:07:14Z
source:         RIPE # Filtered

% Information related to '193.242.107.0/24AS31027'

route:          193.242.107.0/24
descr:          Mariendal-Elteknik
origin:         AS31027
mnt-by:         nia-mnt
created:        2010-05-05T07:22:48Z
last-modified:  2010-05-05T07:22:48Z
source:         RIPE

% Information related to '193.242.107.0/24AS3292'

route:          193.242.107.0/24
descr:          MARIENDAL-EL-TEKNIK
origin:         AS3292
remarks:        +---------------------------------------+
remarks:        | For abuse and security issues contact |
remarks:        | csirt@csirt.dk, http://www.csirt.dk   |
remarks:        +---------------------------------------+
mnt-by:         TDK-MNT
mnt-by:         nia-mnt
created:        2007-07-30T07:46:21Z
last-modified:  2010-03-27T10:20:32Z
source:         RIPE

% This query was served by the RIPE Database Query Service version 1.121.2 (SHETLAND)
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.242.107.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;193.242.107.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032201 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 08:57:53 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 70.107.242.193.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 70.107.242.193.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.106.30.99 attack
/wp-includes/pomo/so.php?x=1
2019-08-09 14:59:37
1.192.218.179 attackspam
firewall-block, port(s): 445/tcp
2019-08-09 14:58:44
107.172.80.131 attackspam
firewall-block, port(s): 445/tcp
2019-08-09 14:50:26
62.4.27.96 attackspam
port 23 attempt blocked
2019-08-09 14:55:52
78.245.118.141 attackspambots
Aug  9 03:58:02 icinga sshd[24722]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.245.118.141
Aug  9 03:58:04 icinga sshd[24722]: Failed password for invalid user prueba01 from 78.245.118.141 port 55544 ssh2
...
2019-08-09 14:40:22
156.197.45.232 attack
23/tcp
[2019-08-09]1pkt
2019-08-09 15:19:46
89.46.107.174 attackspam
xmlrpc attack
2019-08-09 15:17:48
14.34.28.131 attackbotsspam
Aug  9 02:32:05 vps647732 sshd[2654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.34.28.131
Aug  9 02:32:08 vps647732 sshd[2654]: Failed password for invalid user webster from 14.34.28.131 port 32918 ssh2
...
2019-08-09 14:57:44
40.112.220.119 attack
leo_www
2019-08-09 15:15:29
35.246.244.55 attackspam
Triggered by Fail2Ban at Vostok web server
2019-08-09 14:42:40
165.227.69.39 attackspam
Aug  9 07:26:16 www sshd\[14466\]: Invalid user stephan from 165.227.69.39 port 44580
...
2019-08-09 14:43:06
37.187.54.45 attackbotsspam
Aug  9 08:50:48 SilenceServices sshd[21257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.45
Aug  9 08:50:50 SilenceServices sshd[21257]: Failed password for invalid user hadoop from 37.187.54.45 port 41158 ssh2
Aug  9 08:54:58 SilenceServices sshd[24615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.54.45
2019-08-09 15:07:25
189.4.1.12 attackspam
Aug  7 09:06:48 tuxlinux sshd[47712]: Invalid user yong from 189.4.1.12 port 54934
Aug  7 09:06:48 tuxlinux sshd[47712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.1.12 
Aug  7 09:06:48 tuxlinux sshd[47712]: Invalid user yong from 189.4.1.12 port 54934
Aug  7 09:06:48 tuxlinux sshd[47712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.1.12 
Aug  7 09:06:48 tuxlinux sshd[47712]: Invalid user yong from 189.4.1.12 port 54934
Aug  7 09:06:48 tuxlinux sshd[47712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.4.1.12 
Aug  7 09:06:50 tuxlinux sshd[47712]: Failed password for invalid user yong from 189.4.1.12 port 54934 ssh2
...
2019-08-09 14:53:26
178.32.35.79 attackbotsspam
Aug  9 02:06:50 lnxded63 sshd[316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.35.79
2019-08-09 14:42:22
41.185.65.29 attackspam
xmlrpc attack
2019-08-09 15:14:34

Recently Reported IPs

211.239.108.27 121.230.89.101 2606:4700:10::ac43:1982 2606:4700:10::6814:6605
2606:4700:10::6816:4669 2606:4700:10::6814:5279 2606:4700:10::6816:3824 2606:4700:10::6816:1612
2606:4700:10::6816:3032 2606:4700:10::ac43:2332 2606:4700:10::6816:543 2606:4700:10::6814:6308
96.47.104.217 38.54.124.39 83.214.239.115 78.132.5.119
66.128.162.204 46.93.97.238 238.207.5.94 196.50.22.126