Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.240.242.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7612
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.240.242.47.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 22:23:31 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 47.242.240.208.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 47.242.240.208.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
107.172.211.57 attackbotsspam
2020-09-05 11:40:44.362724-0500  localhost smtpd[42271]: NOQUEUE: reject: RCPT from unknown[107.172.211.57]: 554 5.7.1 Service unavailable; Client host [107.172.211.57] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<00ea9024.carryglow.buzz>
2020-09-07 00:13:59
151.235.244.143 attackspam
port scan and connect, tcp 23 (telnet)
2020-09-07 00:31:47
138.36.201.246 attackbotsspam
Sep 5 18:48:02 *host* postfix/smtps/smtpd\[6367\]: warning: unknown\[138.36.201.246\]: SASL PLAIN authentication failed:
2020-09-07 00:20:02
2.38.130.63 attackbots
 TCP (SYN) 2.38.130.63:8570 -> port 8080, len 44
2020-09-07 00:34:16
37.139.7.127 attack
2020-09-06T17:56:53+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-09-07 00:39:55
36.71.190.252 attackbots
Automatic report - Port Scan Attack
2020-09-07 00:08:59
138.36.202.237 attackspam
Brute force attempt
2020-09-07 00:37:27
89.248.167.131 attackspam
Sep  6 12:34:47 [-] [-]: client @0x7f8bfc101910 89.248.167.131#56399 (direct.shodan.io): query (cache) 'direct.shodan.io/A/IN' denied
2020-09-07 00:22:55
61.155.2.142 attack
Sep  6 19:20:34 pkdns2 sshd\[27575\]: Invalid user msconfig from 61.155.2.142Sep  6 19:20:36 pkdns2 sshd\[27575\]: Failed password for invalid user msconfig from 61.155.2.142 port 4609 ssh2Sep  6 19:22:22 pkdns2 sshd\[27635\]: Invalid user porn from 61.155.2.142Sep  6 19:22:23 pkdns2 sshd\[27635\]: Failed password for invalid user porn from 61.155.2.142 port 21057 ssh2Sep  6 19:24:00 pkdns2 sshd\[27680\]: Invalid user rayngay from 61.155.2.142Sep  6 19:24:02 pkdns2 sshd\[27680\]: Failed password for invalid user rayngay from 61.155.2.142 port 37506 ssh2
...
2020-09-07 00:25:12
144.172.84.120 attackbotsspam
sending spam
2020-09-07 00:30:00
167.248.133.35 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-07 00:40:40
49.234.81.14 attack
Icarus honeypot on github
2020-09-07 00:33:52
62.234.137.26 attackbots
Port Scan
...
2020-09-07 00:14:12
85.209.0.103 attack
Multiple SSH login attempts.
2020-09-07 00:27:10
150.109.147.145 attackbots
$f2bV_matches
2020-09-07 00:23:35

Recently Reported IPs

120.174.213.65 226.156.49.65 242.50.88.101 135.182.213.188
30.233.144.103 29.151.139.249 45.147.118.149 10.18.7.193
180.33.202.13 59.241.206.30 198.11.168.248 169.112.176.155
144.21.157.204 216.129.224.78 147.24.190.226 184.239.247.70
40.143.6.22 255.199.189.131 161.227.181.97 87.162.157.172