Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.154.102.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28766
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.154.102.200.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 03:28:28 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 200.102.154.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 200.102.154.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.233.49.203 attack
DATE:2020-04-11 14:15:03, IP:219.233.49.203, PORT:1433 MSSQL brute force auth on honeypot server (epe-honey1-hq)
2020-04-12 02:18:15
181.174.107.113 attack
Unauthorized connection attempt from IP address 181.174.107.113 on Port 445(SMB)
2020-04-12 02:10:43
1.55.250.46 attackbots
Unauthorized connection attempt from IP address 1.55.250.46 on Port 445(SMB)
2020-04-12 02:13:21
103.138.40.226 attackspam
1586607294 - 04/11/2020 14:14:54 Host: 103.138.40.226/103.138.40.226 Port: 445 TCP Blocked
2020-04-12 02:27:31
180.127.36.171 attackbotsspam
" "
2020-04-12 02:31:00
116.6.133.167 attackbots
Unauthorized connection attempt from IP address 116.6.133.167 on Port 445(SMB)
2020-04-12 02:11:53
222.219.73.111 attackbots
*Port Scan* detected from 222.219.73.111 (CN/China/111.73.219.222.broad.bs.yn.dynamic.163data.com.cn). 4 hits in the last 246 seconds
2020-04-12 02:38:48
45.55.210.248 attack
Apr 11 22:48:17 gw1 sshd[1896]: Failed password for root from 45.55.210.248 port 34890 ssh2
...
2020-04-12 02:05:23
128.199.69.167 attackbotsspam
SSH Authentication Attempts Exceeded
2020-04-12 02:08:12
120.92.42.123 attackspam
2020-04-11T17:36:52.247683abusebot-4.cloudsearch.cf sshd[2200]: Invalid user ida from 120.92.42.123 port 24646
2020-04-11T17:36:52.254338abusebot-4.cloudsearch.cf sshd[2200]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.42.123
2020-04-11T17:36:52.247683abusebot-4.cloudsearch.cf sshd[2200]: Invalid user ida from 120.92.42.123 port 24646
2020-04-11T17:36:54.329316abusebot-4.cloudsearch.cf sshd[2200]: Failed password for invalid user ida from 120.92.42.123 port 24646 ssh2
2020-04-11T17:39:35.807197abusebot-4.cloudsearch.cf sshd[2347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.92.42.123  user=root
2020-04-11T17:39:37.590893abusebot-4.cloudsearch.cf sshd[2347]: Failed password for root from 120.92.42.123 port 55722 ssh2
2020-04-11T17:42:10.401402abusebot-4.cloudsearch.cf sshd[2530]: Invalid user mysql from 120.92.42.123 port 22296
...
2020-04-12 02:29:33
51.79.66.142 attack
Apr 11 12:07:17 mail sshd\[62154\]: Invalid user h from 51.79.66.142
Apr 11 12:07:17 mail sshd\[62154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.66.142
...
2020-04-12 02:41:05
5.3.6.82 attackspam
Apr 11 15:42:50 localhost sshd[71134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.82  user=root
Apr 11 15:42:52 localhost sshd[71134]: Failed password for root from 5.3.6.82 port 34854 ssh2
Apr 11 15:46:12 localhost sshd[71478]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.82  user=root
Apr 11 15:46:14 localhost sshd[71478]: Failed password for root from 5.3.6.82 port 42262 ssh2
Apr 11 15:49:29 localhost sshd[71867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.82  user=root
Apr 11 15:49:31 localhost sshd[71867]: Failed password for root from 5.3.6.82 port 49138 ssh2
...
2020-04-12 02:12:59
106.75.231.150 attack
Apr 11 12:25:26 our-server-hostname sshd[11073]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.231.150  user=r.r
Apr 11 12:25:28 our-server-hostname sshd[11073]: Failed password for r.r from 106.75.231.150 port 45526 ssh2
Apr 11 12:32:43 our-server-hostname sshd[12922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.231.150  user=r.r
Apr 11 12:32:45 our-server-hostname sshd[12922]: Failed password for r.r from 106.75.231.150 port 54502 ssh2
Apr 11 12:36:10 our-server-hostname sshd[13825]: Invalid user printul from 106.75.231.150
Apr 11 12:36:10 our-server-hostname sshd[13825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.231.150 
Apr 11 12:36:11 our-server-hostname sshd[13825]: Failed password for invalid user printul from 106.75.231.150 port 59844 ssh2
Apr 11 12:39:27 our-server-hostname sshd[14648]: pam_unix(sshd:auth): aut........
-------------------------------
2020-04-12 02:33:14
179.98.109.188 attackbots
$f2bV_matches
2020-04-12 02:06:18
95.58.195.34 attackspam
Unauthorized connection attempt from IP address 95.58.195.34 on Port 445(SMB)
2020-04-12 02:04:56

Recently Reported IPs

80.199.228.86 237.128.101.77 43.184.207.126 8.130.188.217
219.178.191.183 234.201.144.80 60.210.131.117 156.248.22.224
247.53.168.23 52.92.135.133 61.180.18.167 221.89.134.125
4.164.167.32 244.107.215.49 239.210.125.61 249.118.161.168
80.254.200.137 218.53.49.141 73.35.33.26 186.214.243.164