Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.121.227.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24053
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.121.227.29.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 21:20:48 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 29.227.121.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 29.227.121.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.255.121.135 attackspambots
Automatic report - Banned IP Access
2019-09-30 03:05:03
49.151.202.115 attack
Unauthorized connection attempt from IP address 49.151.202.115 on Port 445(SMB)
2019-09-30 02:57:13
123.59.38.6 attackbots
Sep 29 17:49:36 legacy sshd[24154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.38.6
Sep 29 17:49:39 legacy sshd[24154]: Failed password for invalid user control from 123.59.38.6 port 49691 ssh2
Sep 29 17:54:30 legacy sshd[24236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.59.38.6
...
2019-09-30 02:51:27
58.254.132.49 attack
Sep 29 19:53:16 dedicated sshd[20717]: Invalid user lis from 58.254.132.49 port 39418
2019-09-30 02:47:09
139.199.158.14 attack
Sep 29 20:14:07 markkoudstaal sshd[32709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.158.14
Sep 29 20:14:09 markkoudstaal sshd[32709]: Failed password for invalid user kiwi from 139.199.158.14 port 36847 ssh2
Sep 29 20:19:20 markkoudstaal sshd[750]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.158.14
2019-09-30 02:58:54
87.122.119.79 attackbots
8090/tcp
[2019-09-29]1pkt
2019-09-30 03:14:54
78.186.22.187 attack
Unauthorized connection attempt from IP address 78.186.22.187 on Port 445(SMB)
2019-09-30 03:04:06
218.66.179.220 attack
5431/tcp
[2019-09-29]1pkt
2019-09-30 02:43:42
180.188.16.8 attackbots
445/tcp
[2019-09-29]1pkt
2019-09-30 03:16:59
1.164.254.45 attack
Port scan
2019-09-30 02:47:47
123.125.71.39 attack
Automatic report - Banned IP Access
2019-09-30 03:10:11
60.178.151.179 attackbots
DATE:2019-09-29 14:02:36, IP:60.178.151.179, PORT:1433 - MSSQL brute force auth on a honeypot server (epe-dc)
2019-09-30 03:07:08
110.93.223.73 attackspambots
Unauthorized connection attempt from IP address 110.93.223.73 on Port 445(SMB)
2019-09-30 03:04:21
197.50.148.86 attackbotsspam
Chat Spam
2019-09-30 02:51:11
95.31.149.94 attack
Unauthorized connection attempt from IP address 95.31.149.94 on Port 445(SMB)
2019-09-30 03:13:05

Recently Reported IPs

190.121.15.84 233.129.26.19 63.15.148.187 46.183.195.234
163.110.164.17 223.184.75.65 252.177.184.210 75.19.77.45
106.78.135.5 226.66.236.1 167.234.134.221 162.45.70.18
137.40.78.36 174.132.44.229 171.220.232.175 68.245.210.155
129.142.105.23 214.182.244.45 67.212.2.153 161.183.234.106