Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.141.117.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8556
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.141.117.51.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:21:59 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 51.117.141.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 51.117.141.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.19.178 attackspam
2020-06-03 15:11:47.747579-0500  localhost sshd[27499]: Failed password for root from 106.13.19.178 port 54572 ssh2
2020-06-04 05:15:58
49.233.67.11 attackspambots
WordPress brute force
2020-06-04 05:12:20
175.139.252.125 attackbots
Honeypot attack, port: 81, PTR: PTR record not found
2020-06-04 05:04:31
35.194.246.104 attackspambots
WordPress brute force
2020-06-04 05:14:58
186.28.231.210 attackbotsspam
Honeypot attack, port: 445, PTR: taxexpress.com.co.
2020-06-04 04:52:22
167.114.114.193 attackbotsspam
prod8
...
2020-06-04 04:57:32
47.56.154.54 attack
WordPress brute force
2020-06-04 05:12:40
165.22.18.168 attackbotsspam
Jun  3 22:28:14 piServer sshd[21547]: Failed password for root from 165.22.18.168 port 34646 ssh2
Jun  3 22:31:26 piServer sshd[21848]: Failed password for root from 165.22.18.168 port 39850 ssh2
...
2020-06-04 04:42:21
42.113.249.62 attack
Unauthorized connection attempt from IP address 42.113.249.62 on Port 445(SMB)
2020-06-04 04:55:25
85.18.98.208 attack
Jun  3 22:59:34 abendstille sshd\[3951\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.18.98.208  user=root
Jun  3 22:59:36 abendstille sshd\[3951\]: Failed password for root from 85.18.98.208 port 35451 ssh2
Jun  3 23:03:34 abendstille sshd\[7729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.18.98.208  user=root
Jun  3 23:03:36 abendstille sshd\[7729\]: Failed password for root from 85.18.98.208 port 32190 ssh2
Jun  3 23:07:36 abendstille sshd\[11846\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.18.98.208  user=root
...
2020-06-04 05:16:27
183.238.155.66 attackspam
$f2bV_matches
2020-06-04 04:49:31
188.162.166.132 attackspambots
Unauthorized connection attempt from IP address 188.162.166.132 on Port 445(SMB)
2020-06-04 04:42:03
91.121.7.146 attack
WordPress brute force
2020-06-04 05:08:50
138.204.234.14 attack
Unauthorized connection attempt from IP address 138.204.234.14 on Port 445(SMB)
2020-06-04 04:41:20
145.239.82.192 attackbots
Jun  3 22:02:55 prox sshd[30868]: Failed password for root from 145.239.82.192 port 43970 ssh2
2020-06-04 05:07:02

Recently Reported IPs

209.254.25.17 228.32.25.48 19.122.144.41 82.235.5.44
114.58.55.5 122.145.136.203 31.39.170.12 5.80.230.73
212.240.158.4 126.200.226.74 66.170.67.19 54.4.231.243
226.24.190.28 193.113.95.210 209.43.215.160 41.52.99.1
198.242.144.249 68.238.201.161 139.158.72.253 217.209.38.179