Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.242.42.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59566
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.242.42.51.			IN	A

;; AUTHORITY SECTION:
.			474	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 01:33:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
51.42.242.212.in-addr.arpa domain name pointer webmail.telenor.dk.
51.42.242.212.in-addr.arpa domain name pointer netmail.telenor.dk.
51.42.242.212.in-addr.arpa domain name pointer mail.sonofon.dk.
51.42.242.212.in-addr.arpa domain name pointer uf4.telenor.dk.
51.42.242.212.in-addr.arpa domain name pointer post.telenor.dk.
51.42.242.212.in-addr.arpa domain name pointer net.telenor.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
51.42.242.212.in-addr.arpa	name = uf4.telenor.dk.
51.42.242.212.in-addr.arpa	name = post.telenor.dk.
51.42.242.212.in-addr.arpa	name = net.telenor.dk.
51.42.242.212.in-addr.arpa	name = webmail.telenor.dk.
51.42.242.212.in-addr.arpa	name = netmail.telenor.dk.
51.42.242.212.in-addr.arpa	name = mail.sonofon.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.158.29.207 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 34 - port: 5060 proto: UDP cat: Misc Attack
2020-04-23 20:42:52
109.242.211.180 attackspam
Unauthorized connection attempt detected from IP address 109.242.211.180 to port 23
2020-04-23 21:00:47
185.50.149.24 attack
Apr 23 14:38:04 relay postfix/smtpd\[9656\]: warning: unknown\[185.50.149.24\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 23 14:38:20 relay postfix/smtpd\[9688\]: warning: unknown\[185.50.149.24\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 23 14:39:08 relay postfix/smtpd\[9656\]: warning: unknown\[185.50.149.24\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 23 14:39:24 relay postfix/smtpd\[4779\]: warning: unknown\[185.50.149.24\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr 23 14:40:29 relay postfix/smtpd\[9656\]: warning: unknown\[185.50.149.24\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-23 20:52:55
89.144.47.246 attack
Port scan: Attack repeated for 24 hours
2020-04-23 20:36:52
77.42.83.170 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-23 20:58:29
174.192.83.5 attackbots
WEB_SERVER 403 Forbidden
2020-04-23 21:12:47
185.33.203.190 attack
Unauthorized connection attempt from IP address 185.33.203.190 on Port 445(SMB)
2020-04-23 20:51:17
114.34.180.2 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-23 21:11:33
94.102.50.137 attack
Unauthorized connection attempt detected from IP address 94.102.50.137 to port 14122
2020-04-23 20:34:19
54.223.61.142 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-04-23 20:41:53
138.68.107.225 attack
SSH invalid-user multiple login try
2020-04-23 20:58:04
34.93.149.4 attackbotsspam
Apr 23 12:36:11 lukav-desktop sshd\[5192\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.149.4  user=root
Apr 23 12:36:13 lukav-desktop sshd\[5192\]: Failed password for root from 34.93.149.4 port 50862 ssh2
Apr 23 12:41:57 lukav-desktop sshd\[5518\]: Invalid user admin from 34.93.149.4
Apr 23 12:41:57 lukav-desktop sshd\[5518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.93.149.4
Apr 23 12:41:59 lukav-desktop sshd\[5518\]: Failed password for invalid user admin from 34.93.149.4 port 36774 ssh2
2020-04-23 21:13:40
83.97.20.35 attackspambots
[Thu Apr 23 05:13:10 2020] - DDoS Attack From IP: 83.97.20.35 Port: 54393
2020-04-23 20:39:30
23.94.175.46 attack
(From claudiauclement@yahoo.com) Hi, We are wondering if you would be interested in our service, where we can provide you with a dofollow link from Amazon (DA 96) back to mathesfamilychiropractic.com?

The price is just $67 per link, via Paypal.

To explain what DA is and the benefit for your website, along with a sample of an existing link, please read here: https://justpaste.it/6jp87

If you'd be interested in learning more, reply to this email but please make sure you include the word INTERESTED in the subject line field, so we can get to your reply sooner.

Kind Regards,
Claudia
2020-04-23 20:51:02
51.255.173.70 attackspam
Apr 23 15:08:56 host sshd[16582]: Invalid user zq from 51.255.173.70 port 37694
...
2020-04-23 21:11:10

Recently Reported IPs

212.243.165.93 212.241.16.182 212.242.42.50 212.243.83.62
212.242.42.52 212.242.42.54 212.243.109.47 212.243.73.107
212.24.98.12 212.25.0.46 212.25.129.5 212.25.83.149
212.25.83.150 212.25.26.200 212.25.26.241 212.25.183.111
212.250.3.80 212.25.26.173 212.251.116.193 212.250.82.205