Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.140.59.79
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.140.59.79.			IN	A

;; AUTHORITY SECTION:
.			65	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 21:52:00 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 79.59.140.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 79.59.140.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.203.172.166 attackspam
Port scan and direct access per IP instead of hostname
2019-07-28 17:50:15
51.83.74.203 attackbotsspam
Invalid user spice from 51.83.74.203 port 47821
2019-07-28 18:51:48
106.45.0.111 attackspambots
GET /common.js HTTP/1.1
2019-07-28 17:39:09
202.162.200.67 attackspambots
Web attack: WordPress.
2019-07-28 17:26:24
182.61.106.24 attack
My-Apache-Badbots (ownc)
2019-07-28 18:59:50
86.34.230.162 attackbotsspam
:
2019-07-28 18:22:10
14.229.18.90 attackspambots
Port scan: Attack repeated for 24 hours
2019-07-28 18:04:47
79.140.20.253 attackbots
Automatic report - Port Scan Attack
2019-07-28 18:14:17
107.6.171.130 attack
Port scan and direct access per IP instead of hostname
2019-07-28 17:26:53
162.243.143.89 attack
1433/tcp 27019/tcp 23474/tcp...
[2019-05-27/07-27]59pkt,51pt.(tcp),2pt.(udp)
2019-07-28 18:23:02
81.22.45.95 attackspambots
Jul 28 08:41:53 lumpi kernel: INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.95 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=6213 PROTO=TCP SPT=57926 DPT=3396 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-07-28 17:44:46
5.196.72.58 attack
Jul 28 09:08:10 pornomens sshd\[19616\]: Invalid user backuppc from 5.196.72.58 port 53122
Jul 28 09:08:10 pornomens sshd\[19616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.72.58
Jul 28 09:08:13 pornomens sshd\[19616\]: Failed password for invalid user backuppc from 5.196.72.58 port 53122 ssh2
...
2019-07-28 17:28:57
51.91.13.195 attackspam
28.07.2019 09:44:40 Connection to port 5080 blocked by firewall
2019-07-28 18:46:21
106.12.213.162 attackspambots
Jul 28 06:48:20 server sshd\[17266\]: Invalid user pleasure from 106.12.213.162 port 38070
Jul 28 06:48:20 server sshd\[17266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.213.162
Jul 28 06:48:22 server sshd\[17266\]: Failed password for invalid user pleasure from 106.12.213.162 port 38070 ssh2
Jul 28 06:50:30 server sshd\[16247\]: Invalid user shellg from 106.12.213.162 port 58660
Jul 28 06:50:30 server sshd\[16247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.213.162
2019-07-28 17:58:36
162.243.143.52 attack
28178/tcp 88/tcp 13858/tcp...
[2019-05-28/07-27]67pkt,57pt.(tcp),1pt.(udp)
2019-07-28 17:38:42

Recently Reported IPs

136.105.86.114 20.231.190.154 222.199.54.57 170.221.232.193
247.140.244.92 187.186.205.195 15.54.9.11 216.133.132.106
173.236.52.35 174.234.96.161 203.118.40.70 129.85.102.228
137.12.200.29 163.187.251.14 133.102.199.35 103.84.224.95
104.44.222.48 198.77.154.245 127.171.79.109 145.143.175.30