Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.242.165.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39677
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.242.165.225.			IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010601 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 07 05:02:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
225.165.242.2.in-addr.arpa domain name pointer dynamic-002-242-165-225.2.242.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
225.165.242.2.in-addr.arpa	name = dynamic-002-242-165-225.2.242.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.41.184.129 attack
Unauthorized connection attempt from IP address 93.41.184.129 on Port 445(SMB)
2020-01-08 01:11:16
14.183.25.160 attackspam
Unauthorized connection attempt from IP address 14.183.25.160 on Port 445(SMB)
2020-01-08 00:54:34
112.133.251.43 attackspam
Unauthorized connection attempt from IP address 112.133.251.43 on Port 445(SMB)
2020-01-08 01:14:46
119.23.32.254 attackspam
Port 1433 Scan
2020-01-08 00:59:12
198.186.13.20 attackspam
tcp 9000
2020-01-08 00:41:16
108.162.216.232 attack
Fake GoogleBot
2020-01-08 01:16:21
193.16.45.91 attackspambots
Unauthorized connection attempt from IP address 193.16.45.91 on Port 445(SMB)
2020-01-08 00:37:21
184.71.214.234 attackbots
Unauthorized connection attempt detected from IP address 184.71.214.234 to port 1433 [J]
2020-01-08 00:44:58
124.109.62.34 attackbotsspam
firewall-block, port(s): 445/tcp
2020-01-08 00:58:39
117.7.98.95 attack
Unauthorized connection attempt from IP address 117.7.98.95 on Port 445(SMB)
2020-01-08 01:04:57
181.211.112.2 attack
Unauthorized connection attempt detected from IP address 181.211.112.2 to port 2220 [J]
2020-01-08 00:53:56
209.17.96.42 attackbotsspam
The IP has triggered Cloudflare WAF. CF-Ray: 55145a6c2e81c887 | WAF_Rule_ID: ipr24 | WAF_Kind: firewall | CF_Action: challenge | Country: US | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: notes.skk.moe | User-Agent: Mozilla/5.0 (compatible; Nimbostratus-Bot/v1.3.2; http://cloudsystemnetworks.com) | CF_DC: MIA. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-01-08 01:13:45
207.154.232.160 attackspambots
Jan  7 17:42:40 albuquerque sshd\[16595\]: Invalid user postgres from 207.154.232.160Jan  7 17:44:06 albuquerque sshd\[16626\]: Invalid user zabbix from 207.154.232.160Jan  7 17:45:30 albuquerque sshd\[16650\]: Invalid user www from 207.154.232.160
...
2020-01-08 00:46:34
45.242.123.87 attackspam
Unauthorized connection attempt from IP address 45.242.123.87 on Port 445(SMB)
2020-01-08 00:51:30
36.67.84.27 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 07-01-2020 13:00:15.
2020-01-08 01:08:15

Recently Reported IPs

130.78.155.159 227.145.223.13 61.116.59.37 220.14.88.7
104.192.37.67 18.82.17.229 121.84.7.67 175.69.6.141
72.166.176.78 26.111.114.95 13.104.244.219 144.219.231.83
43.216.35.231 57.207.236.97 153.207.81.196 172.7.204.158
131.53.15.129 185.61.78.177 170.251.86.102 89.113.101.85