Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.242.80.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25799
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.242.80.41.			IN	A

;; AUTHORITY SECTION:
.			478	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020801 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 09 14:18:44 CST 2022
;; MSG SIZE  rcvd: 104
Host info
41.80.242.2.in-addr.arpa domain name pointer dynamic-002-242-080-041.2.242.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
41.80.242.2.in-addr.arpa	name = dynamic-002-242-080-041.2.242.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
81.214.50.243 attackspam
Unauthorized connection attempt from IP address 81.214.50.243 on Port 445(SMB)
2020-01-04 19:55:54
39.45.130.218 attackbots
23/tcp
[2020-01-04]1pkt
2020-01-04 20:03:21
27.34.242.250 attackspam
Jan  4 05:36:27 thevastnessof sshd[13051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.34.242.250
...
2020-01-04 19:58:04
35.189.172.158 attackbotsspam
Unauthorized SSH connection attempt
2020-01-04 19:51:59
81.28.100.136 attack
Jan  4 05:45:30 smtp postfix/smtpd[87306]: NOQUEUE: reject: RCPT from shallow.shrewdmhealth.com[81.28.100.136]: 554 5.7.1 Service unavailable; Client host [81.28.100.136] blocked using zen.spamhaus.org; from= to= proto=ESMTP helo=
2020-01-04 20:10:15
202.179.6.26 attackspambots
Unauthorized connection attempt from IP address 202.179.6.26 on Port 445(SMB)
2020-01-04 19:36:03
112.207.195.12 attack
unauthorized connection attempt
2020-01-04 19:49:26
14.186.190.121 attackspam
Unauthorized connection attempt from IP address 14.186.190.121 on Port 445(SMB)
2020-01-04 19:59:51
212.86.97.209 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2020-01-04 19:49:03
176.110.121.90 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/176.110.121.90/ 
 
 KZ - 1H : (1)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KZ 
 NAME ASN : ASN59498 
 
 IP : 176.110.121.90 
 
 CIDR : 176.110.121.0/24 
 
 PREFIX COUNT : 10 
 
 UNIQUE IP COUNT : 3328 
 
 
 ATTACKS DETECTED ASN59498 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2020-01-04 05:45:48 
 
 INFO : Potentially Bad Traffic Scan Detected and Blocked by ADMIN  - data recovery
2020-01-04 19:50:42
202.107.238.94 attack
2020-01-04T06:32:30.052318centos sshd\[26097\]: Invalid user oracledbtest from 202.107.238.94 port 43424
2020-01-04T06:32:30.058145centos sshd\[26097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.107.238.94
2020-01-04T06:32:32.800151centos sshd\[26097\]: Failed password for invalid user oracledbtest from 202.107.238.94 port 43424 ssh2
2020-01-04 20:08:51
116.226.31.119 attackspam
Unauthorized connection attempt from IP address 116.226.31.119 on Port 445(SMB)
2020-01-04 19:48:30
111.229.103.67 attackbots
2020-01-03 UTC: 2x - (2x)
2020-01-04 20:13:09
46.242.61.14 attack
Unauthorized connection attempt from IP address 46.242.61.14 on Port 445(SMB)
2020-01-04 19:51:29
49.205.100.18 attack
Unauthorized connection attempt from IP address 49.205.100.18 on Port 445(SMB)
2020-01-04 20:05:51

Recently Reported IPs

169.1.55.183 49.36.30.211 95.181.150.182 222.4.196.176
198.21.193.29 220.15.212.238 199.182.35.140 5.101.154.123
230.194.151.47 19.165.30.135 132.47.22.221 160.125.33.105
7.94.89.197 248.18.184.24 132.69.98.130 14.81.170.165
196.190.52.62 94.130.145.46 148.204.108.215 230.2.2.1