Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.113.40.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39784
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.113.40.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:21:23 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 54.40.113.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.40.113.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
62.234.91.204 attackspam
Triggered by Fail2Ban at Ares web server
2020-04-03 01:27:42
167.114.98.229 attack
2020-04-02T09:39:21.557833linuxbox-skyline sshd[45289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.98.229  user=root
2020-04-02T09:39:23.721470linuxbox-skyline sshd[45289]: Failed password for root from 167.114.98.229 port 36076 ssh2
...
2020-04-03 01:28:15
51.15.252.216 attackspam
Invalid user nrv from 51.15.252.216 port 34072
2020-04-03 01:50:42
182.136.16.17 attack
(ftpd) Failed FTP login from 182.136.16.17 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Apr  2 17:13:53 ir1 pure-ftpd: (?@182.136.16.17) [WARNING] Authentication failed for user [anonymous]
2020-04-03 01:59:23
106.53.40.211 attackbotsspam
Apr  2 15:20:02 host sshd[26619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.40.211  user=root
Apr  2 15:20:04 host sshd[26619]: Failed password for root from 106.53.40.211 port 46006 ssh2
...
2020-04-03 01:22:23
118.89.219.116 attackbots
" "
2020-04-03 01:23:58
60.15.251.155 attackspambots
CN_APNIC-HM_<177>1585831478 [1:2403388:56419] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 45 [Classification: Misc Attack] [Priority: 2]:  {TCP} 60.15.251.155:16490
2020-04-03 01:31:29
113.141.70.199 attackbots
$f2bV_matches
2020-04-03 01:18:01
37.59.98.64 attack
Apr  2 21:56:11 gw1 sshd[32284]: Failed password for root from 37.59.98.64 port 43892 ssh2
...
2020-04-03 01:13:44
45.125.65.42 attackbotsspam
2020-04-02T17:24:33.729466MailD postfix/smtpd[10035]: warning: unknown[45.125.65.42]: SASL LOGIN authentication failed: authentication failure
2020-04-02T18:29:54.786945MailD postfix/smtpd[14526]: warning: unknown[45.125.65.42]: SASL LOGIN authentication failed: authentication failure
2020-04-02T19:35:55.068579MailD postfix/smtpd[19226]: warning: unknown[45.125.65.42]: SASL LOGIN authentication failed: authentication failure
2020-04-03 01:45:13
102.66.104.204 attackbotsspam
webserver:80 [02/Apr/2020]  "POST /cgi-bin/mainfunction.cgi HTTP/1.1" 403 363 "-" "XTC BOTNET"
2020-04-03 01:25:40
18.230.49.209 attackspam
Lines containing failures of 18.230.49.209
Apr  1 18:35:16 mx-in-01 sshd[11213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.230.49.209  user=r.r
Apr  1 18:35:17 mx-in-01 sshd[11213]: Failed password for r.r from 18.230.49.209 port 52116 ssh2
Apr  1 18:35:19 mx-in-01 sshd[11213]: Received disconnect from 18.230.49.209 port 52116:11: Bye Bye [preauth]
Apr  1 18:35:19 mx-in-01 sshd[11213]: Disconnected from authenticating user r.r 18.230.49.209 port 52116 [preauth]
Apr  1 19:43:45 mx-in-01 sshd[17370]: Connection closed by 18.230.49.209 port 33836 [preauth]
Apr  1 20:06:08 mx-in-01 sshd[19437]: Connection closed by 18.230.49.209 port 47350 [preauth]
Apr  1 20:27:24 mx-in-01 sshd[21303]: Connection closed by 18.230.49.209 port 33926 [preauth]
Apr  1 20:50:28 mx-in-01 sshd[23418]: Invalid user jinsc from 18.230.49.209 port 48150
Apr  1 20:50:28 mx-in-01 sshd[23418]: pam_unix(sshd:auth): authentication failure; logname= uid=0 eui........
------------------------------
2020-04-03 01:54:18
222.186.175.182 attack
Apr  2 17:46:13 localhost sshd\[31511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Apr  2 17:46:15 localhost sshd\[31511\]: Failed password for root from 222.186.175.182 port 32560 ssh2
Apr  2 17:46:18 localhost sshd\[31511\]: Failed password for root from 222.186.175.182 port 32560 ssh2
...
2020-04-03 01:49:36
106.75.100.18 attackspambots
Apr  2 14:36:11 vmd17057 sshd[12144]: Failed password for root from 106.75.100.18 port 41688 ssh2
...
2020-04-03 01:48:09
14.161.43.49 attackspambots
Automatic report - Port Scan Attack
2020-04-03 01:23:25

Recently Reported IPs

76.132.145.143 85.182.103.196 239.99.109.182 250.109.190.36
59.140.142.24 74.27.109.114 59.159.178.94 24.159.213.146
109.158.177.37 3.165.15.122 167.183.150.193 109.10.68.94
24.217.224.134 208.137.152.112 127.192.4.216 187.103.112.111
79.206.137.205 30.93.249.103 208.130.106.251 20.201.23.188