Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.105.131.193
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59016
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.105.131.193.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 19:29:57 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 193.131.105.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 193.131.105.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.160.150 attack
89.248.160.150 was recorded 15 times by 9 hosts attempting to connect to the following ports: 40773,40767,40772. Incident counter (4h, 24h, all-time): 15, 104, 7103
2020-03-09 12:33:19
222.186.173.226 attackbotsspam
$f2bV_matches
2020-03-09 12:45:09
222.186.180.17 attackbotsspam
Mar  8 18:29:56 auw2 sshd\[31631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Mar  8 18:29:58 auw2 sshd\[31631\]: Failed password for root from 222.186.180.17 port 39158 ssh2
Mar  8 18:30:19 auw2 sshd\[31672\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Mar  8 18:30:21 auw2 sshd\[31672\]: Failed password for root from 222.186.180.17 port 7774 ssh2
Mar  8 18:30:42 auw2 sshd\[31686\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
2020-03-09 12:34:29
175.203.55.127 attackbots
port scan and connect, tcp 23 (telnet)
2020-03-09 12:24:16
185.202.1.37 attack
firewall-block, port(s): 3639/tcp, 3640/tcp, 3662/tcp, 3664/tcp, 3675/tcp
2020-03-09 12:30:24
42.116.174.162 attackbotsspam
1583726079 - 03/09/2020 04:54:39 Host: 42.116.174.162/42.116.174.162 Port: 445 TCP Blocked
2020-03-09 12:46:22
222.186.175.215 attack
Mar  9 05:34:48 [host] sshd[26821]: pam_unix(sshd:
Mar  9 05:34:50 [host] sshd[26821]: Failed passwor
Mar  9 05:34:53 [host] sshd[26821]: Failed passwor
2020-03-09 12:40:45
91.237.161.90 attackbots
Automatic report - Port Scan Attack
2020-03-09 12:48:06
27.74.249.172 attack
1583726107 - 03/09/2020 04:55:07 Host: 27.74.249.172/27.74.249.172 Port: 445 TCP Blocked
2020-03-09 12:27:01
222.186.30.218 attack
Mar  9 05:25:23 amit sshd\[29735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.218  user=root
Mar  9 05:25:25 amit sshd\[29735\]: Failed password for root from 222.186.30.218 port 15256 ssh2
Mar  9 05:25:27 amit sshd\[29735\]: Failed password for root from 222.186.30.218 port 15256 ssh2
...
2020-03-09 12:25:52
167.114.89.202 attackbotsspam
Automatic report - XMLRPC Attack
2020-03-09 12:14:58
93.119.205.44 attack
port scan and connect, tcp 23 (telnet)
2020-03-09 12:36:45
47.110.225.29 attack
47.110.225.29 - - [09/Mar/2020:04:54:57 +0100] "GET /wp-login.php HTTP/1.1" 200 5347 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
47.110.225.29 - - [09/Mar/2020:04:55:00 +0100] "POST /wp-login.php HTTP/1.1" 200 6246 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
47.110.225.29 - - [09/Mar/2020:04:55:04 +0100] "POST /xmlrpc.php HTTP/1.1" 200 438 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-09 12:28:51
49.233.192.22 attackbotsspam
2020-03-09T04:18:14.081217shield sshd\[25321\]: Invalid user gbcluster from 49.233.192.22 port 47756
2020-03-09T04:18:14.084962shield sshd\[25321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.192.22
2020-03-09T04:18:16.083867shield sshd\[25321\]: Failed password for invalid user gbcluster from 49.233.192.22 port 47756 ssh2
2020-03-09T04:21:05.703345shield sshd\[25778\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.192.22  user=root
2020-03-09T04:21:07.511436shield sshd\[25778\]: Failed password for root from 49.233.192.22 port 52558 ssh2
2020-03-09 12:27:38
65.191.76.227 attack
2020-03-09T04:48:04.974943vps751288.ovh.net sshd\[31276\]: Invalid user lasse from 65.191.76.227 port 51722
2020-03-09T04:48:04.982775vps751288.ovh.net sshd\[31276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-65-191-76-227.nc.res.rr.com
2020-03-09T04:48:06.837026vps751288.ovh.net sshd\[31276\]: Failed password for invalid user lasse from 65.191.76.227 port 51722 ssh2
2020-03-09T04:55:02.552032vps751288.ovh.net sshd\[31322\]: Invalid user mikel from 65.191.76.227 port 40466
2020-03-09T04:55:02.560825vps751288.ovh.net sshd\[31322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=cpe-65-191-76-227.nc.res.rr.com
2020-03-09 12:30:08

Recently Reported IPs

243.150.205.46 254.180.158.53 19.205.7.122 117.235.26.85
109.41.35.178 234.45.219.222 122.134.164.238 238.124.105.159
248.26.137.13 179.173.193.106 54.46.17.194 141.88.143.47
165.5.21.133 251.229.222.18 60.245.118.0 55.181.142.138
62.211.15.12 17.232.163.98 204.112.28.150 81.59.145.9