Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Telecom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.181.48.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.181.48.242.			IN	A

;; AUTHORITY SECTION:
.			353	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 09:05:46 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 242.48.181.220.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.48.181.220.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.81.210.79 attackspambots
Honeypot attack, port: 445, PTR: 93-81-210-79.broadband.corbina.ru.
2020-02-27 20:02:42
201.237.206.43 attack
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-27 19:54:18
37.195.205.135 attack
Feb 27 02:23:05 plusreed sshd[732]: Invalid user paul from 37.195.205.135
...
2020-02-27 19:36:48
149.202.164.82 attackbots
Feb 27 02:31:24 server sshd\[27383\]: Failed password for invalid user redbot from 149.202.164.82 port 44978 ssh2
Feb 27 08:33:38 server sshd\[7203\]: Invalid user scarab from 149.202.164.82
Feb 27 08:33:38 server sshd\[7203\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82 
Feb 27 08:33:40 server sshd\[7203\]: Failed password for invalid user scarab from 149.202.164.82 port 36824 ssh2
Feb 27 08:43:21 server sshd\[9308\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.164.82  user=nagios
...
2020-02-27 19:44:36
90.74.128.212 attack
Brute force attempt
2020-02-27 19:34:39
189.152.213.212 attackspam
Honeypot attack, port: 81, PTR: dsl-189-152-213-212-dyn.prod-infinitum.com.mx.
2020-02-27 19:51:33
222.186.175.23 attackbotsspam
27.02.2020 12:01:01 SSH access blocked by firewall
2020-02-27 20:01:13
112.85.42.176 attackbots
Feb 27 06:58:24 NPSTNNYC01T sshd[488]: Failed password for root from 112.85.42.176 port 58819 ssh2
Feb 27 06:58:28 NPSTNNYC01T sshd[488]: Failed password for root from 112.85.42.176 port 58819 ssh2
Feb 27 06:58:38 NPSTNNYC01T sshd[488]: Failed password for root from 112.85.42.176 port 58819 ssh2
Feb 27 06:58:38 NPSTNNYC01T sshd[488]: error: maximum authentication attempts exceeded for root from 112.85.42.176 port 58819 ssh2 [preauth]
...
2020-02-27 20:11:15
175.138.0.108 attackspambots
unauthorized connection attempt
2020-02-27 19:37:03
182.78.160.14 attack
Unauthorized connection attempt from IP address 182.78.160.14 on Port 445(SMB)
2020-02-27 19:53:31
190.57.152.52 attackspam
unauthorized connection attempt
2020-02-27 19:57:49
150.107.236.253 attackbots
02/27/2020-11:14:16.066593 150.107.236.253 Protocol: 6 ET POLICY Cleartext WordPress Login
2020-02-27 19:46:31
36.70.133.202 attack
Automatic report - Malicious Script Upload
2020-02-27 20:11:34
181.123.85.106 attack
Feb 27 05:06:25 XXXXXX sshd[62119]: Invalid user webmaster from 181.123.85.106 port 53265
2020-02-27 19:58:05
78.92.235.81 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-02-27 20:04:35

Recently Reported IPs

173.77.152.122 176.58.119.147 37.8.30.115 180.183.130.241
172.105.11.146 173.165.182.203 46.161.11.199 128.90.23.229
113.30.153.154 191.173.112.83 201.150.188.127 209.127.143.219
27.8.16.22 176.194.189.40 139.226.20.62 80.87.188.182
187.85.196.229 87.236.176.54 23.229.110.214 116.55.118.224