Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Reserved

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.119.134.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;242.119.134.222.		IN	A

;; AUTHORITY SECTION:
.			503	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031900 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 19 15:42:13 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 222.134.119.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 222.134.119.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.22.205.6 attackbots
 TCP (SYN) 113.22.205.6:58541 -> port 23, len 40
2020-08-02 03:07:57
36.6.57.111 attackspambots
Aug  1 16:19:49 srv01 postfix/smtpd\[26542\]: warning: unknown\[36.6.57.111\]: SASL LOGIN authentication failed: Invalid base64 data in continued response
Aug  1 16:23:01 srv01 postfix/smtpd\[25979\]: warning: unknown\[36.6.57.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 16:23:16 srv01 postfix/smtpd\[25979\]: warning: unknown\[36.6.57.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 16:23:35 srv01 postfix/smtpd\[25979\]: warning: unknown\[36.6.57.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 16:24:16 srv01 postfix/smtpd\[25979\]: warning: unknown\[36.6.57.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-02 03:00:38
27.75.178.89 attackspam
SMB Server BruteForce Attack
2020-08-02 03:16:05
118.71.231.113 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 03:16:18
51.178.50.20 attackbots
prod6
...
2020-08-02 03:06:18
91.57.29.35 attackbotsspam
Email rejected due to spam filtering
2020-08-02 03:16:49
49.235.98.68 attack
2020-08-01T14:16:32+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-08-02 03:21:47
42.7.182.173 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 02:50:42
27.191.150.58 attackspambots
Port Scan detected!
...
2020-08-02 03:09:40
123.206.255.181 attack
$f2bV_matches
2020-08-02 03:12:01
1.38.176.109 attackspam
Email rejected due to spam filtering
2020-08-02 03:27:03
103.79.169.113 attackspambots
Email rejected due to spam filtering
2020-08-02 03:10:05
194.26.29.141 attack
08/01/2020-15:16:17.331939 194.26.29.141 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-08-02 03:17:10
121.46.26.126 attack
SSH Brute Force
2020-08-02 03:17:41
87.246.7.144 attack
(smtpauth) Failed SMTP AUTH login from 87.246.7.144 (BG/Bulgaria/144.0-255.7.246.87.in-addr.arpa): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-01 16:46:32 login authenticator failed for (p9cic8dhY) [87.246.7.144]: 535 Incorrect authentication data (set_id=reception@breadnarin.com)
2020-08-02 03:18:39

Recently Reported IPs

124.143.128.150 198.175.182.30 62.156.54.32 157.186.199.48
23.254.214.64 109.117.245.27 206.73.228.146 224.132.117.75
230.120.86.6 41.235.181.32 159.203.30.50 117.207.89.199
178.46.210.208 159.65.179.104 177.129.191.142 94.130.181.248
181.45.170.59 45.7.205.14 165.109.107.151 156.216.203.212