Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.0.47.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42423
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.0.47.245.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 00:23:53 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 245.47.0.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.47.0.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.241.207.175 attack
" "
2020-02-19 09:20:38
77.93.126.12 attackspam
Invalid user sinus from 77.93.126.12 port 52996
2020-02-19 09:07:59
122.233.154.62 attackbots
Invalid user alicia from 122.233.154.62 port 33296
2020-02-19 08:48:23
66.96.233.31 attackspam
Invalid user leah from 66.96.233.31 port 49486
2020-02-19 09:09:22
124.160.103.210 attack
Feb 18 18:24:12 aragorn sshd[20385]: Invalid user test1 from 124.160.103.210
Feb 18 18:29:26 aragorn sshd[21297]: Invalid user user from 124.160.103.210
Feb 18 18:29:26 aragorn sshd[21297]: Invalid user user from 124.160.103.210
...
2020-02-19 09:01:43
47.98.162.231 attackbots
Invalid user oracle from 47.98.162.231 port 49284
2020-02-19 08:54:13
115.29.245.139 attackspam
Feb 18 06:08:35 : SSH login attempts with invalid user
2020-02-19 09:28:32
51.15.166.9 attackspam
Invalid user postgres from 51.15.166.9 port 53552
2020-02-19 09:09:42
101.255.65.186 attack
Invalid user ubuntu from 101.255.65.186 port 59614
2020-02-19 09:04:32
97.70.136.214 attack
Invalid user user from 97.70.136.214 port 58960
2020-02-19 09:04:45
77.37.132.131 attackbots
Feb 18 22:33:24 XXX sshd[7555]: Invalid user shiyang from 77.37.132.131 port 52592
2020-02-19 09:26:52
2.229.241.23 attackspambots
Invalid user testuser from 2.229.241.23 port 42496
2020-02-19 09:14:20
51.68.230.54 attack
Invalid user admin from 51.68.230.54 port 53288
2020-02-19 08:53:37
1.215.162.195 attackbots
Spammer
2020-02-19 09:19:56
51.79.69.137 attack
Feb 18 14:33:24 web9 sshd\[5124\]: Invalid user user03 from 51.79.69.137
Feb 18 14:33:24 web9 sshd\[5124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.69.137
Feb 18 14:33:26 web9 sshd\[5124\]: Failed password for invalid user user03 from 51.79.69.137 port 48524 ssh2
Feb 18 14:35:15 web9 sshd\[5401\]: Invalid user jiaxing from 51.79.69.137
Feb 18 14:35:15 web9 sshd\[5401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.69.137
2020-02-19 08:53:10

Recently Reported IPs

56.195.122.110 56.240.202.54 57.51.173.69 87.52.121.134
133.109.30.67 70.197.135.28 134.42.137.63 80.130.85.250
90.175.161.47 53.248.213.194 193.105.254.207 193.164.122.213
135.226.178.45 241.52.254.55 215.231.96.241 162.207.197.24
184.87.84.245 121.208.92.175 126.228.143.98 36.169.243.26