Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Reserved

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.105.39.205
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12161
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;242.105.39.205.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051504 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 16 08:06:41 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 205.39.105.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 205.39.105.242.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
49.145.1.233 attack
unauthorized connection attempt
2020-02-26 14:58:11
200.54.250.98 attackspambots
Feb 25 20:39:23 tdfoods sshd\[8082\]: Invalid user vagrant from 200.54.250.98
Feb 25 20:39:23 tdfoods sshd\[8082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.250.98
Feb 25 20:39:25 tdfoods sshd\[8082\]: Failed password for invalid user vagrant from 200.54.250.98 port 54056 ssh2
Feb 25 20:45:37 tdfoods sshd\[8569\]: Invalid user fof from 200.54.250.98
Feb 25 20:45:37 tdfoods sshd\[8569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.250.98
2020-02-26 14:50:30
187.4.65.186 attackbotsspam
unauthorized connection attempt
2020-02-26 14:42:42
157.245.202.221 attack
unauthorized connection attempt
2020-02-26 14:53:42
45.113.71.23 attackbotsspam
unauthorized connection attempt
2020-02-26 14:40:49
122.117.63.93 attack
unauthorized connection attempt
2020-02-26 14:33:25
123.195.97.25 attackspambots
unauthorized connection attempt
2020-02-26 14:33:04
189.41.87.69 attackspam
unauthorized connection attempt
2020-02-26 14:28:50
203.255.153.99 attackbotsspam
unauthorized connection attempt
2020-02-26 14:26:01
220.132.45.86 attackspambots
unauthorized connection attempt
2020-02-26 15:02:07
89.160.6.83 attack
unauthorized connection attempt
2020-02-26 14:57:08
31.170.53.61 attack
unauthorized connection attempt
2020-02-26 15:01:01
119.122.112.65 attack
unauthorized connection attempt
2020-02-26 14:44:13
190.144.61.51 attackspambots
unauthorized connection attempt
2020-02-26 14:27:54
171.226.131.104 attackspambots
unauthorized connection attempt
2020-02-26 14:43:01

Recently Reported IPs

186.151.92.109 138.197.162.115 45.122.220.167 185.234.218.36
176.9.89.73 85.15.179.235 162.144.89.205 170.150.52.5
190.58.170.58 125.64.16.53 186.185.165.198 23.224.10.46
199.217.119.233 148.72.232.57 98.222.208.54 181.211.12.246
83.158.208.64 204.48.18.234 98.113.203.60 31.28.241.117