Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Edinburgh

Region: Scotland

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.121.24.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21051
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.121.24.42.			IN	A

;; AUTHORITY SECTION:
.			178	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111501 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Nov 16 04:08:09 CST 2019
;; MSG SIZE  rcvd: 115
Host info
42.24.121.2.in-addr.arpa domain name pointer 0279182a.bb.sky.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.24.121.2.in-addr.arpa	name = 0279182a.bb.sky.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
164.132.98.19 attackspambots
Invalid user lopez from 164.132.98.19 port 50774
2020-04-15 13:53:14
91.144.173.197 attackspam
Apr 15 12:07:49 webhost01 sshd[31297]: Failed password for root from 91.144.173.197 port 41910 ssh2
...
2020-04-15 13:51:52
220.169.229.204 attackspambots
Brute force blocker - service: proftpd1 - aantal: 30 - Wed Mar 28 02:20:13 2018
2020-04-15 14:05:42
61.219.171.213 attackbotsspam
$f2bV_matches
2020-04-15 14:00:34
47.94.9.178 attack
Unauthorized SSH login attempts
2020-04-15 14:13:39
109.124.65.86 attack
Apr 15 06:53:01  sshd[27167]: Failed password for invalid user flw from 109.124.65.86 port 56270 ssh2
2020-04-15 14:13:19
190.103.202.7 attack
Invalid user veatch from 190.103.202.7 port 53666
2020-04-15 14:29:40
198.20.99.130 attackbotsspam
Port 6512 scan denied
2020-04-15 14:28:04
192.241.185.120 attackspambots
Invalid user butter from 192.241.185.120 port 55984
2020-04-15 14:23:47
163.172.49.56 attackbotsspam
Apr 15 07:57:19  sshd[28042]: Failed password for invalid user local from 163.172.49.56 port 33121 ssh2
2020-04-15 14:13:04
34.80.135.20 attackbotsspam
Apr 15 08:14:25 hosting sshd[21639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.135.80.34.bc.googleusercontent.com  user=root
Apr 15 08:14:26 hosting sshd[21639]: Failed password for root from 34.80.135.20 port 55762 ssh2
...
2020-04-15 14:10:48
210.97.40.36 attackbots
Apr 15 00:10:02 NPSTNNYC01T sshd[30424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.97.40.36
Apr 15 00:10:03 NPSTNNYC01T sshd[30424]: Failed password for invalid user Redistoor from 210.97.40.36 port 39380 ssh2
Apr 15 00:14:12 NPSTNNYC01T sshd[31142]: Failed password for root from 210.97.40.36 port 50350 ssh2
...
2020-04-15 13:48:48
46.173.208.2 attackbotsspam
Icarus honeypot on github
2020-04-15 13:52:16
35.194.37.43 attack
Apr 15 08:11:45  sshd[26347]: Failed password for invalid user zxin10 from 35.194.37.43 port 38956 ssh2
2020-04-15 14:20:20
218.92.0.171 attackspam
2020-04-15T07:53:04.053836librenms sshd[2767]: Failed password for root from 218.92.0.171 port 54418 ssh2
2020-04-15T07:53:07.689588librenms sshd[2767]: Failed password for root from 218.92.0.171 port 54418 ssh2
2020-04-15T07:53:10.907875librenms sshd[2767]: Failed password for root from 218.92.0.171 port 54418 ssh2
...
2020-04-15 14:06:06

Recently Reported IPs

85.41.35.25 199.97.171.52 211.152.156.58 111.9.101.152
48.168.14.203 45.153.65.207 9.179.124.32 30.236.204.125
35.112.232.10 81.183.209.51 1.117.90.165 71.106.75.110
27.137.220.228 55.187.101.38 15.206.15.107 122.232.214.173
106.241.144.131 211.214.58.21 211.152.156.55 213.32.63.26