Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Morocco

Internet Service Provider: IAM

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.72.242.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19263
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.72.242.242.			IN	A

;; AUTHORITY SECTION:
.			163	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020110101 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 02 03:39:24 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 242.242.72.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.242.72.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
187.162.117.222 attackspambots
Honeypot attack, port: 23, PTR: 187-162-117-222.static.axtel.net.
2019-11-01 15:52:53
168.255.251.126 attackbotsspam
$f2bV_matches
2019-11-01 16:07:47
178.128.38.86 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-01 16:31:25
121.182.166.82 attack
SSH Brute-Force reported by Fail2Ban
2019-11-01 16:24:29
157.230.247.239 attackbots
Nov  1 05:25:47 work-partkepr sshd\[12914\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.247.239  user=root
Nov  1 05:25:49 work-partkepr sshd\[12914\]: Failed password for root from 157.230.247.239 port 53054 ssh2
...
2019-11-01 15:49:21
93.119.178.174 attackbotsspam
Nov  1 07:49:26 hcbbdb sshd\[12442\]: Invalid user desarrollo from 93.119.178.174
Nov  1 07:49:26 hcbbdb sshd\[12442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.119.178.174
Nov  1 07:49:27 hcbbdb sshd\[12442\]: Failed password for invalid user desarrollo from 93.119.178.174 port 39390 ssh2
Nov  1 07:53:45 hcbbdb sshd\[12859\]: Invalid user tnt123 from 93.119.178.174
Nov  1 07:53:45 hcbbdb sshd\[12859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.119.178.174
2019-11-01 16:04:56
177.42.254.199 attackspam
web-1 [ssh_2] SSH Attack
2019-11-01 15:54:19
119.29.170.120 attack
2019-11-01T04:58:21.727723abusebot-8.cloudsearch.cf sshd\[1390\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.170.120  user=root
2019-11-01 16:03:07
37.105.205.14 attack
60001/tcp
[2019-11-01]1pkt
2019-11-01 16:09:48
101.51.204.89 attackspam
445/tcp
[2019-11-01]1pkt
2019-11-01 16:02:53
112.78.135.83 attackbotsspam
445/tcp
[2019-11-01]1pkt
2019-11-01 16:26:36
34.67.206.171 attack
22/tcp 22/tcp
[2019-11-01]2pkt
2019-11-01 16:29:39
186.95.236.10 attackbots
445/tcp
[2019-11-01]1pkt
2019-11-01 16:23:38
121.142.111.86 attackspam
Nov  1 07:57:30 XXX sshd[5739]: Invalid user ofsaa from 121.142.111.86 port 48046
2019-11-01 16:13:18
194.247.27.19 attackbots
slow and persistent scanner
2019-11-01 16:31:10

Recently Reported IPs

45.135.187.116 172.93.111.146 51.15.59.108 113.185.47.213
46.114.111.62 46.114.104.129 185.63.153.86 157.245.84.86
175.140.235.21 221.200.81.249 174.197.195.84 199.232.77.2
114.222.152.221 151.192.229.157 60.225.74.15 42.113.204.254
180.13.192.209 177.74.254.159 103.155.172.72 103.155.172.74