Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.109.150.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53166
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.109.150.189.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:45:27 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 189.150.109.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 189.150.109.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
220.123.146.126 attackspambots
unauthorized connection attempt
2020-02-16 17:11:33
125.19.37.226 attackbots
Feb 16 07:08:47 sd-53420 sshd\[4766\]: User root from 125.19.37.226 not allowed because none of user's groups are listed in AllowGroups
Feb 16 07:08:47 sd-53420 sshd\[4766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.19.37.226  user=root
Feb 16 07:08:49 sd-53420 sshd\[4766\]: Failed password for invalid user root from 125.19.37.226 port 38576 ssh2
Feb 16 07:12:33 sd-53420 sshd\[5249\]: User root from 125.19.37.226 not allowed because none of user's groups are listed in AllowGroups
Feb 16 07:12:33 sd-53420 sshd\[5249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.19.37.226  user=root
...
2020-02-16 17:10:15
102.68.78.123 attackbotsspam
unauthorized connection attempt
2020-02-16 17:02:56
220.132.214.196 attack
unauthorized connection attempt
2020-02-16 16:50:43
200.91.29.150 attack
unauthorized connection attempt
2020-02-16 16:52:02
81.169.239.161 attackbotsspam
spam
2020-02-16 17:27:24
209.141.35.177 attackbots
ssh brute force
2020-02-16 17:33:10
115.135.57.5 attackspam
unauthorized connection attempt
2020-02-16 17:35:19
103.66.79.211 attackbotsspam
unauthorized connection attempt
2020-02-16 16:54:48
200.49.60.66 attackspambots
1581828980 - 02/16/2020 05:56:20 Host: 200.49.60.66/200.49.60.66 Port: 445 TCP Blocked
2020-02-16 17:25:55
187.120.34.22 attackbotsspam
unauthorized connection attempt
2020-02-16 17:19:46
182.113.243.61 attackspam
unauthorized connection attempt
2020-02-16 16:48:30
78.22.118.241 attackbotsspam
unauthorized connection attempt
2020-02-16 17:27:59
69.166.127.138 attackbots
unauthorized connection attempt
2020-02-16 17:04:55
116.100.193.255 attackspambots
unauthorized connection attempt
2020-02-16 16:53:54

Recently Reported IPs

97.67.14.1 33.193.237.212 30.106.234.136 192.69.109.1
119.180.0.120 59.145.0.174 242.183.159.189 2.13.2.188
30.33.194.128 97.101.13.212 32.131.211.205 73.214.129.146
95.1.5.103 173.165.187.109 251.0.71.218 155.13.3.103
3.134.148.130 60.215.167.150 147.10.32.118 24.155.10.75