Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Reserved

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.139.100.131
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16219
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;242.139.100.131.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081900 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Aug 19 18:50:30 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 131.100.139.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 131.100.139.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.18.225 attackspambots
Unauthorized connection attempt detected from IP address 106.12.18.225 to port 2220 [J]
2020-01-07 07:11:04
101.96.113.50 attack
Jan  6 20:42:42 powerpi2 sshd[26412]: Invalid user barison from 101.96.113.50 port 39076
Jan  6 20:42:44 powerpi2 sshd[26412]: Failed password for invalid user barison from 101.96.113.50 port 39076 ssh2
Jan  6 20:50:55 powerpi2 sshd[26876]: Invalid user yjs from 101.96.113.50 port 58002
...
2020-01-07 06:59:52
59.31.78.227 attackbots
Automatic report - SSH Brute-Force Attack
2020-01-07 07:17:13
103.105.56.39 attack
Jan  6 16:23:34 ingram sshd[28857]: Invalid user aasrum from 103.105.56.39
Jan  6 16:23:34 ingram sshd[28857]: Failed password for invalid user aasrum from 103.105.56.39 port 38286 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=103.105.56.39
2020-01-07 06:53:49
183.82.107.67 attackspam
Unauthorized connection attempt detected from IP address 183.82.107.67 to port 2220 [J]
2020-01-07 06:56:37
197.248.16.118 attack
Unauthorized connection attempt detected from IP address 197.248.16.118 to port 2220 [J]
2020-01-07 07:01:11
49.234.60.13 attack
Jan  6 23:57:32 SilenceServices sshd[25461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.60.13
Jan  6 23:57:35 SilenceServices sshd[25461]: Failed password for invalid user apache from 49.234.60.13 port 45828 ssh2
Jan  7 00:00:07 SilenceServices sshd[26236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.60.13
2020-01-07 07:20:04
112.21.191.54 attackbots
Unauthorized connection attempt detected from IP address 112.21.191.54 to port 2220 [J]
2020-01-07 07:10:41
187.141.135.181 attackspambots
Unauthorized connection attempt detected from IP address 187.141.135.181 to port 2220 [J]
2020-01-07 06:52:34
51.158.25.170 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2020-01-07 06:42:51
115.166.22.140 attackbots
Unauthorized connection attempt detected from IP address 115.166.22.140 to port 23 [J]
2020-01-07 07:10:17
159.203.201.177 attack
8047/tcp 70/tcp 8945/tcp...
[2019-11-07/2020-01-06]39pkt,32pt.(tcp),1pt.(udp)
2020-01-07 07:00:50
102.133.170.132 attackspambots
Jan  6 23:53:40 plex sshd[2678]: Invalid user solr from 102.133.170.132 port 40876
2020-01-07 06:57:06
114.97.186.174 attack
Brute force attempt
2020-01-07 06:50:00
130.176.13.86 attackbots
Automatic report generated by Wazuh
2020-01-07 06:48:13

Recently Reported IPs

212.51.136.4 27.24.165.159 94.73.238.150 77.253.129.4
106.12.33.226 106.33.53.239 3.239.200.89 89.23.143.49
144.172.165.30 50.201.200.57 183.63.190.186 167.71.237.85
77.122.154.95 122.152.218.213 9.205.243.162 85.176.26.31
219.199.202.62 236.95.95.146 57.107.41.204 76.62.104.121