Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.129.143.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32101
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.129.143.50.			IN	A

;; AUTHORITY SECTION:
.			594	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024100202 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 03 06:14:07 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 50.143.129.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.143.129.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.62.50.156 attackbots
REQUESTED PAGE: /HNAP1/
2019-11-26 06:57:47
218.92.0.138 attackbots
Nov 25 23:56:15 mail sshd[1669]: Failed password for root from 218.92.0.138 port 54828 ssh2
Nov 25 23:56:21 mail sshd[1669]: Failed password for root from 218.92.0.138 port 54828 ssh2
Nov 25 23:56:26 mail sshd[1669]: Failed password for root from 218.92.0.138 port 54828 ssh2
Nov 25 23:56:30 mail sshd[1669]: Failed password for root from 218.92.0.138 port 54828 ssh2
2019-11-26 06:59:39
185.176.27.118 attack
11/25/2019-17:47:16.490403 185.176.27.118 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-26 06:52:50
106.51.230.186 attack
2019-11-25T18:07:25.118487abusebot.cloudsearch.cf sshd\[16814\]: Invalid user ident from 106.51.230.186 port 53616
2019-11-26 06:35:02
178.168.120.136 attackspambots
T: f2b postfix aggressive 3x
2019-11-26 06:32:56
114.84.150.13 attackbotsspam
Nov 25 18:37:23 vpn01 sshd[13851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.84.150.13
Nov 25 18:37:25 vpn01 sshd[13851]: Failed password for invalid user znc-admin from 114.84.150.13 port 35952 ssh2
...
2019-11-26 06:37:37
222.186.190.2 attackspam
Nov 25 23:46:53 dedicated sshd[31650]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Nov 25 23:46:55 dedicated sshd[31650]: Failed password for root from 222.186.190.2 port 1684 ssh2
2019-11-26 07:07:29
218.92.0.184 attackspam
Nov 26 00:53:42 server sshd\[20443\]: User root from 218.92.0.184 not allowed because listed in DenyUsers
Nov 26 00:53:42 server sshd\[20443\]: Failed none for invalid user root from 218.92.0.184 port 19922 ssh2
Nov 26 00:53:42 server sshd\[20443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.184  user=root
Nov 26 00:53:44 server sshd\[20443\]: Failed password for invalid user root from 218.92.0.184 port 19922 ssh2
Nov 26 00:53:48 server sshd\[20443\]: Failed password for invalid user root from 218.92.0.184 port 19922 ssh2
2019-11-26 07:02:53
172.94.8.227 attack
Made 48 attempts to hack website.
2019-11-26 06:33:39
89.248.168.202 attackbots
11/25/2019-23:47:04.032628 89.248.168.202 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-26 07:00:28
202.83.172.249 attack
2019-11-25T22:46:56.558170abusebot-8.cloudsearch.cf sshd\[29599\]: Invalid user emmalynne from 202.83.172.249 port 40110
2019-11-26 07:06:47
202.105.136.106 attackspambots
Nov 25 23:43:11 sd-53420 sshd\[15506\]: User root from 202.105.136.106 not allowed because none of user's groups are listed in AllowGroups
Nov 25 23:43:11 sd-53420 sshd\[15506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.105.136.106  user=root
Nov 25 23:43:13 sd-53420 sshd\[15506\]: Failed password for invalid user root from 202.105.136.106 port 53314 ssh2
Nov 25 23:47:01 sd-53420 sshd\[16119\]: Invalid user admin from 202.105.136.106
Nov 25 23:47:01 sd-53420 sshd\[16119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.105.136.106
...
2019-11-26 07:01:34
80.210.0.115 attackspam
Automatic report - Banned IP Access
2019-11-26 06:53:40
222.186.180.6 attackspam
Brute-force attempt banned
2019-11-26 07:07:52
41.226.13.129 attack
RDP Bruteforce
2019-11-26 06:28:22

Recently Reported IPs

159.35.118.37 106.210.109.49 233.208.1.156 73.61.185.26
2003:c0:5f38:61eb:616a:a3b8:d5cc:2365 169.52.7.235 233.150.187.222 6.237.90.104
16.102.13.226 96.46.2.250 245.135.143.116 167.137.11.52
105.94.250.211 208.226.201.173 129.152.238.34 166.30.158.81
64.239.23.134 126.162.58.118 56.49.85.35 174.195.254.140