Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.189.162.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28726
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.189.162.242.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 04:40:13 CST 2025
;; MSG SIZE  rcvd: 108
Host info
242.162.189.217.in-addr.arpa domain name pointer dynamic-217-189-162-242.217.189.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.162.189.217.in-addr.arpa	name = dynamic-217-189-162-242.217.189.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.165 attackbots
SSH Brute-Force attacks
2020-09-01 16:39:36
109.74.198.200 attackbots
Port Scan detected!
...
2020-09-01 16:37:10
181.49.154.26 attackspam
This client attempted to login to an administrator account on a Website, or abused from another resource.
2020-09-01 16:53:34
103.219.112.1 attackbots
Unauthorized connection attempt detected from IP address 103.219.112.1 to port 12684 [T]
2020-09-01 16:48:11
156.198.107.225 attack
Telnet Server BruteForce Attack
2020-09-01 17:05:51
120.52.146.211 attackbotsspam
Sep  1 10:15:24 server sshd[22669]: User root from 120.52.146.211 not allowed because listed in DenyUsers
...
2020-09-01 16:43:15
61.8.68.227 attackspam
20/8/31@23:50:07: FAIL: Alarm-Network address from=61.8.68.227
20/8/31@23:50:08: FAIL: Alarm-Network address from=61.8.68.227
...
2020-09-01 16:49:00
103.87.229.183 attackbotsspam
Brute Force
2020-09-01 17:01:16
87.246.7.145 attackspam
spam (f2b h2)
2020-09-01 16:29:43
106.12.187.250 attackspambots
Failed password for invalid user dwc from 106.12.187.250 port 34008 ssh2
2020-09-01 17:05:04
185.175.93.104 attackspam
 TCP (SYN) 185.175.93.104:49895 -> port 11220, len 44
2020-09-01 16:36:55
49.234.27.90 attackbotsspam
sshd: Failed password for invalid user .... from 49.234.27.90 port 46182 ssh2 (2 attempts)
2020-09-01 17:08:24
74.120.14.30 attack
 TCP (SYN) 74.120.14.30:18264 -> port 11211, len 44
2020-09-01 16:54:56
119.117.42.235 attackbotsspam
Port probing on unauthorized port 1433
2020-09-01 16:43:49
74.82.47.23 attackspam
srv02 Mass scanning activity detected Target: 53413  ..
2020-09-01 16:54:07

Recently Reported IPs

233.167.214.217 176.5.199.9 129.116.175.240 237.220.51.108
182.105.77.5 153.220.118.244 163.251.220.115 36.65.57.18
65.193.162.169 86.158.122.113 39.116.3.115 13.18.20.165
39.188.237.62 125.131.106.41 26.57.232.253 235.18.35.165
126.91.156.36 211.31.26.225 244.249.146.249 103.82.97.101