Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 241.132.197.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40092
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;241.132.197.242.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:40:11 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 242.197.132.241.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.197.132.241.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.160.206.250 attackspam
1592309773 - 06/16/2020 14:16:13 Host: 118.160.206.250/118.160.206.250 Port: 445 TCP Blocked
2020-06-17 03:51:28
203.190.34.91 attackbotsspam
Unauthorized IMAP connection attempt
2020-06-17 03:41:22
112.145.210.253 attackbotsspam
Telnetd brute force attack detected by fail2ban
2020-06-17 03:55:10
65.48.155.5 attackbotsspam
Port Scan detected!
...
2020-06-17 03:23:27
170.233.159.112 attackspam
Jun 16 14:12:13 vps687878 sshd\[32123\]: Failed password for invalid user user1 from 170.233.159.112 port 36387 ssh2
Jun 16 14:14:05 vps687878 sshd\[32309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.233.159.112  user=debian
Jun 16 14:14:07 vps687878 sshd\[32309\]: Failed password for debian from 170.233.159.112 port 48726 ssh2
Jun 16 14:16:00 vps687878 sshd\[32519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.233.159.112  user=root
Jun 16 14:16:02 vps687878 sshd\[32519\]: Failed password for root from 170.233.159.112 port 32838 ssh2
...
2020-06-17 03:26:43
122.121.24.86 attackbots
[portscan] Port scan
2020-06-17 03:36:37
118.25.49.56 attackbots
Invalid user yana from 118.25.49.56 port 58682
2020-06-17 03:59:34
138.99.6.184 attackbotsspam
2020-06-16T20:19:21.342155n23.at sshd[932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.99.6.184  user=root
2020-06-16T20:19:23.219019n23.at sshd[932]: Failed password for root from 138.99.6.184 port 41466 ssh2
2020-06-16T20:22:51.456879n23.at sshd[4255]: Invalid user lf from 138.99.6.184 port 35526
...
2020-06-17 03:27:11
195.46.122.127 attackspambots
Unauthorized connection attempt from IP address 195.46.122.127 on Port 445(SMB)
2020-06-17 03:53:39
54.37.71.203 attackbotsspam
2020-06-16T16:17:05.199810mail.standpoint.com.ua sshd[29392]: Invalid user zabbix from 54.37.71.203 port 56790
2020-06-16T16:17:05.202725mail.standpoint.com.ua sshd[29392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.ip-54-37-71.eu
2020-06-16T16:17:05.199810mail.standpoint.com.ua sshd[29392]: Invalid user zabbix from 54.37.71.203 port 56790
2020-06-16T16:17:07.022135mail.standpoint.com.ua sshd[29392]: Failed password for invalid user zabbix from 54.37.71.203 port 56790 ssh2
2020-06-16T16:20:44.134802mail.standpoint.com.ua sshd[29906]: Invalid user teste from 54.37.71.203 port 59494
...
2020-06-17 03:39:11
222.239.28.177 attack
$f2bV_matches
2020-06-17 03:21:46
14.232.176.154 attackspam
Unauthorized connection attempt from IP address 14.232.176.154 on Port 445(SMB)
2020-06-17 03:45:55
14.102.7.169 attack
20/6/16@08:16:12: FAIL: Alarm-Intrusion address from=14.102.7.169
...
2020-06-17 03:53:05
159.65.77.254 attackbotsspam
SSH Login Bruteforce
2020-06-17 03:31:47
203.147.71.11 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-06-17 03:29:44

Recently Reported IPs

97.46.239.18 156.108.212.62 73.104.195.74 33.12.253.10
155.7.241.109 15.139.7.10 94.105.151.255 229.45.58.175
109.56.219.64 157.238.135.213 121.255.194.111 209.66.43.247
64.34.112.6 123.201.45.187 173.85.244.246 234.186.64.24
137.171.45.18 124.132.56.149 80.251.250.87 54.64.9.224