Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.229.66.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44057
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.229.66.242.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 03:42:12 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 242.66.229.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.66.229.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
162.229.179.69 attack
trying to access non-authorized port
2020-02-10 07:22:27
118.25.178.131 attackbotsspam
Feb  9 22:04:52 vlre-nyc-1 sshd\[8511\]: Invalid user rsv from 118.25.178.131
Feb  9 22:04:52 vlre-nyc-1 sshd\[8511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.178.131
Feb  9 22:04:53 vlre-nyc-1 sshd\[8511\]: Failed password for invalid user rsv from 118.25.178.131 port 53620 ssh2
Feb  9 22:07:44 vlre-nyc-1 sshd\[8567\]: Invalid user rph from 118.25.178.131
Feb  9 22:07:44 vlre-nyc-1 sshd\[8567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.178.131
...
2020-02-10 07:45:41
202.187.131.110 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-10 07:51:47
89.122.105.22 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-10 07:46:58
194.204.236.164 attack
Hacking
2020-02-10 07:28:19
222.85.29.51 attackspambots
Honeypot attack, port: 445, PTR: 51.29.85.222.broad.xc.ha.dynamic.163data.com.cn.
2020-02-10 07:43:39
212.237.63.28 attackspambots
Feb  9 19:04:55 firewall sshd[7422]: Invalid user nhr from 212.237.63.28
Feb  9 19:04:57 firewall sshd[7422]: Failed password for invalid user nhr from 212.237.63.28 port 59126 ssh2
Feb  9 19:07:50 firewall sshd[7589]: Invalid user hsb from 212.237.63.28
...
2020-02-10 07:42:42
51.15.95.127 attack
Feb  9 13:18:17 hpm sshd\[29526\]: Invalid user trx from 51.15.95.127
Feb  9 13:18:17 hpm sshd\[29526\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.95.127
Feb  9 13:18:19 hpm sshd\[29526\]: Failed password for invalid user trx from 51.15.95.127 port 38320 ssh2
Feb  9 13:21:17 hpm sshd\[29862\]: Invalid user jvw from 51.15.95.127
Feb  9 13:21:17 hpm sshd\[29862\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.95.127
2020-02-10 07:31:06
222.186.30.248 attackbotsspam
09.02.2020 23:11:58 SSH access blocked by firewall
2020-02-10 07:14:27
185.176.222.41 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-10 07:25:55
113.61.139.44 attackspam
Honeypot attack, port: 81, PTR: 113-61-139-44.veetime.com.
2020-02-10 07:47:56
47.89.179.29 attack
wp-login.php
2020-02-10 07:37:17
119.29.129.88 attackspam
$f2bV_matches
2020-02-10 07:19:02
185.253.180.96 attackspambots
[portscan] Port scan
2020-02-10 07:27:13
176.59.5.40 attack
firewall-block, port(s): 445/tcp
2020-02-10 07:36:12

Recently Reported IPs

182.140.231.103 226.166.105.75 122.111.160.191 220.131.88.17
36.18.174.233 126.64.38.148 170.253.233.153 3.233.48.141
161.44.44.232 239.147.178.229 203.229.242.150 83.56.236.34
96.199.252.102 250.50.23.108 14.221.159.37 172.31.156.137
61.71.181.12 89.170.155.220 93.240.68.56 198.46.29.2