Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.107.152.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21076
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.107.152.158.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 04:10:11 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 158.152.107.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 158.152.107.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
84.17.49.138 attackspam
2020-08-14 20:59:59
218.92.0.221 attackbots
sshd jail - ssh hack attempt
2020-08-14 20:55:44
134.209.7.179 attack
Aug 14 15:22:49 hosting sshd[29639]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.7.179  user=root
Aug 14 15:22:51 hosting sshd[29639]: Failed password for root from 134.209.7.179 port 51952 ssh2
Aug 14 15:26:44 hosting sshd[29989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.7.179  user=root
Aug 14 15:26:46 hosting sshd[29989]: Failed password for root from 134.209.7.179 port 33510 ssh2
...
2020-08-14 20:33:57
51.15.207.203 attack
2020-08-14 21:13:07
84.17.48.68 attack
2020-08-14 21:01:34
138.68.176.38 attack
Aug 14 09:22:45 firewall sshd[16513]: Failed password for root from 138.68.176.38 port 49364 ssh2
Aug 14 09:26:38 firewall sshd[16684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.176.38  user=root
Aug 14 09:26:39 firewall sshd[16684]: Failed password for root from 138.68.176.38 port 60716 ssh2
...
2020-08-14 20:46:53
165.227.10.203 attackbots
Nmap.Script.Scanner
2020-08-14 20:46:11
89.187.178.220 attackbots
2020-08-14 20:48:46
89.238.154.169 attack
2020-08-14 20:48:30
208.100.26.229 attackspambots
Nmap.Script.Scanner
2020-08-14 20:39:38
68.142.140.84 attackspam
2020-08-14 21:06:23
84.17.48.70 attackbots
2020-08-14 21:01:18
80.4.11.2 attackspambots
2020-08-14 21:04:28
84.17.47.78 attackspam
2020-08-14 21:02:58
178.128.144.227 attackbots
Aug 14 14:37:49 abendstille sshd\[11466\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.227  user=root
Aug 14 14:37:51 abendstille sshd\[11466\]: Failed password for root from 178.128.144.227 port 49392 ssh2
Aug 14 14:41:31 abendstille sshd\[15322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.227  user=root
Aug 14 14:41:33 abendstille sshd\[15322\]: Failed password for root from 178.128.144.227 port 59100 ssh2
Aug 14 14:45:14 abendstille sshd\[18789\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.144.227  user=root
...
2020-08-14 20:56:06

Recently Reported IPs

208.195.113.3 13.35.155.106 34.197.2.234 145.145.157.58
20.104.45.15 119.152.112.53 246.124.243.147 150.187.106.57
126.132.103.97 240.31.1.129 3.180.1.223 127.187.150.190
30.161.104.189 9.90.59.146 2.0.31.244 200.5.131.223
19.146.147.123 97.106.159.135 16.112.154.131 119.129.95.161