Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 195.42.81.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8625
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;195.42.81.240.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121000 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 11 00:55:53 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 240.81.42.195.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 240.81.42.195.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.174.3 attackspambots
Port 102 scan denied
2020-03-25 20:35:28
165.227.65.140 attack
Port 8545 (Ethereum client) access denied
2020-03-25 20:26:54
80.82.77.245 attackbotsspam
Port 445 (MS DS) access denied
2020-03-25 20:40:32
51.91.212.80 attackbots
scans once in preceeding hours on the ports (in chronological order) 4433 resulting in total of 3 scans from 51.91.212.0/24 block.
2020-03-25 20:47:45
92.118.37.99 attackspam
scans 13 times in preceeding hours on the ports (in chronological order) 30911 31711 32011 30811 36211 37211 30411 33011 37211 37011 34711 26611 26311 resulting in total of 29 scans from 92.118.37.0/24 block.
2020-03-25 20:33:59
49.233.140.233 attack
fail2ban
2020-03-25 20:48:55
185.175.93.104 attack
Fail2Ban Ban Triggered
2020-03-25 20:21:11
185.156.73.38 attackbots
Fail2Ban Ban Triggered
2020-03-25 20:22:57
87.214.234.168 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-25 20:38:32
198.108.67.89 attack
03/25/2020-05:39:21.275694 198.108.67.89 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-25 20:08:07
222.186.15.236 attackspam
firewall-block, port(s): 22/tcp
2020-03-25 20:04:38
92.118.37.70 attackspam
Port scan: Attack repeated for 24 hours
2020-03-25 20:34:59
94.102.56.181 attackspam
scans 5 times in preceeding hours on the ports (in chronological order) 3741 3757 3765 3769 3749 resulting in total of 16 scans from 94.102.48.0/20 block.
2020-03-25 20:32:27
93.174.93.72 attackspambots
scans 4 times in preceeding hours on the ports (in chronological order) 36998 60998 59998 56998 resulting in total of 5 scans from 93.174.88.0/21 block.
2020-03-25 20:33:26
37.49.231.121 attackbotsspam
Mar 25 12:56:55 debian-2gb-nbg1-2 kernel: \[7396494.916815\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=37.49.231.121 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=54321 PROTO=TCP SPT=54647 DPT=81 WINDOW=65535 RES=0x00 SYN URGP=0
2020-03-25 20:50:51

Recently Reported IPs

137.131.30.171 225.47.96.102 115.53.176.148 228.2.106.77
156.244.105.130 160.71.140.161 185.85.16.82 173.198.81.106
224.152.104.142 96.72.52.90 164.149.59.152 164.176.200.150
241.47.143.70 226.62.38.48 126.30.153.114 93.226.224.25
126.96.172.68 17.141.38.38 97.145.78.196 129.154.165.151