Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.123.53.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.123.53.207.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 49 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 12:38:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 207.53.123.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.53.123.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.40.131.155 attack
Unauthorized connection attempt from IP address 117.40.131.155 on Port 445(SMB)
2020-03-14 01:38:04
103.116.105.118 attackspambots
Unauthorized connection attempt from IP address 103.116.105.118 on Port 445(SMB)
2020-03-14 01:54:50
192.249.115.24 attack
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-14 01:57:35
101.99.14.54 attackbots
Unauthorized connection attempt from IP address 101.99.14.54 on Port 445(SMB)
2020-03-14 01:34:32
186.212.117.61 attack
1584111135 - 03/13/2020 15:52:15 Host: 186.212.117.61/186.212.117.61 Port: 445 TCP Blocked
2020-03-14 01:52:07
112.133.251.47 attackbots
Unauthorized connection attempt from IP address 112.133.251.47 on Port 445(SMB)
2020-03-14 01:44:33
183.82.37.78 attackbots
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2020-03-14 01:33:53
188.191.18.129 attackbots
Mar 13 14:40:16 vpn01 sshd[2975]: Failed password for root from 188.191.18.129 port 34296 ssh2
...
2020-03-14 02:07:00
218.156.216.84 attack
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-14 01:53:05
193.57.40.38 attack
$f2bV_matches
2020-03-14 01:51:40
51.75.23.62 attackbotsspam
2020-03-13T17:23:33.754520homeassistant sshd[8631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.23.62  user=root
2020-03-13T17:23:35.901426homeassistant sshd[8631]: Failed password for root from 51.75.23.62 port 45860 ssh2
...
2020-03-14 01:32:03
144.217.15.221 attack
Feb 18 05:25:13 pi sshd[26702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.15.221 
Feb 18 05:25:15 pi sshd[26702]: Failed password for invalid user cron from 144.217.15.221 port 57248 ssh2
2020-03-14 02:05:14
116.55.140.149 attack
Automatic report - Banned IP Access
2020-03-14 01:26:09
144.217.89.55 attack
SSH_scan
2020-03-14 01:47:17
196.190.7.27 attackbots
Unauthorized connection attempt from IP address 196.190.7.27 on Port 445(SMB)
2020-03-14 02:04:40

Recently Reported IPs

194.82.185.143 139.118.112.32 97.141.216.144 193.206.80.148
67.141.40.92 213.227.77.26 229.94.224.96 103.97.43.172
115.222.217.95 247.102.193.52 185.197.116.65 220.198.101.134
218.127.7.28 188.254.41.230 246.137.106.84 229.135.245.46
230.102.163.19 109.222.76.142 22.56.176.56 68.25.162.62