Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.158.66.15
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28196
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.158.66.15.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 22:57:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 15.66.158.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 15.66.158.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
143.208.249.50 attackbotsspam
Brute force attempt
2020-09-06 16:14:44
202.154.40.18 attack
Automatic report - Banned IP Access
2020-09-06 16:38:03
45.227.255.205 attackbots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-06T07:54:53Z
2020-09-06 16:10:30
112.85.42.30 attack
Sep  6 04:19:24 ny01 sshd[18463]: Failed password for root from 112.85.42.30 port 46464 ssh2
Sep  6 04:21:11 ny01 sshd[18678]: Failed password for root from 112.85.42.30 port 18128 ssh2
2020-09-06 16:27:32
78.133.163.190 attackbots
Dovecot Invalid User Login Attempt.
2020-09-06 16:21:18
194.99.105.206 attackspambots
Attempt to access VoIP server
2020-09-06 16:36:07
103.194.242.254 attackspambots
Dovecot Invalid User Login Attempt.
2020-09-06 16:28:20
2.92.159.63 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-06 16:33:50
185.220.101.215 attack
Sep  6 09:21:24 ns3164893 sshd[15249]: Failed password for root from 185.220.101.215 port 9872 ssh2
Sep  6 09:21:26 ns3164893 sshd[15249]: Failed password for root from 185.220.101.215 port 9872 ssh2
...
2020-09-06 16:23:43
46.105.97.40 attack
Trying to access WordPress File
2020-09-06 16:20:24
186.167.64.162 attack
Attempted connection to port 445.
2020-09-06 16:38:31
50.196.46.20 attack
Honeypot attack, port: 81, PTR: 50-196-46-20-static.hfc.comcastbusiness.net.
2020-09-06 16:27:15
74.120.14.19 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 6379 proto: tcp cat: Misc Attackbytes: 60
2020-09-06 16:33:04
5.39.44.17 attack
Coordinated SSH brute-force attack from different IPs. pam_unix(sshd:auth):
2020-09-06 16:44:30
93.124.105.236 attackbots
Last visit 2020-09-05 11:55:56
2020-09-06 16:11:28

Recently Reported IPs

30.99.29.134 164.158.163.38 138.116.60.54 181.122.76.111
162.232.67.156 195.231.142.188 188.144.83.23 176.59.79.188
72.8.30.81 19.215.123.159 218.133.247.24 255.11.67.106
217.13.85.61 92.130.20.17 60.225.224.27 107.79.134.190
53.101.170.155 79.179.208.11 115.59.60.226 46.115.52.38