Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.164.166.62
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.164.166.62.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 46 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 22:50:57 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 62.166.164.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 62.166.164.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.19.174.42 attackspam
:
2019-08-07 17:37:29
107.172.46.50 attackbots
Aug  7 13:57:30 lcl-usvr-01 sshd[1439]: Invalid user user5 from 107.172.46.50
Aug  7 13:57:30 lcl-usvr-01 sshd[1439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.172.46.50 
Aug  7 13:57:30 lcl-usvr-01 sshd[1439]: Invalid user user5 from 107.172.46.50
Aug  7 13:57:32 lcl-usvr-01 sshd[1439]: Failed password for invalid user user5 from 107.172.46.50 port 42436 ssh2
Aug  7 14:01:48 lcl-usvr-01 sshd[3101]: Invalid user ccp from 107.172.46.50
2019-08-07 17:12:30
5.3.6.82 attackspam
Aug  7 09:02:24 amit sshd\[11950\]: Invalid user xyz from 5.3.6.82
Aug  7 09:02:24 amit sshd\[11950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.3.6.82
Aug  7 09:02:27 amit sshd\[11950\]: Failed password for invalid user xyz from 5.3.6.82 port 41696 ssh2
...
2019-08-07 16:50:51
109.103.37.235 attackspam
firewall-block, port(s): 23/tcp
2019-08-07 16:34:29
54.38.82.14 attackbotsspam
Aug  7 15:57:11 lcl-usvr-01 sshd[13784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.82.14  user=root
2019-08-07 17:19:00
98.6.214.182 attack
NAME : RCSW CIDR : 98.6.0.0/16 SYN Flood DDoS Attack USA - Colorado - block certain countries :) IP: 98.6.214.182  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-07 16:36:33
51.83.32.88 attackspam
Aug  7 09:00:35 mail sshd\[16653\]: Failed password for invalid user rt from 51.83.32.88 port 43786 ssh2
Aug  7 09:19:54 mail sshd\[16876\]: Invalid user jamese from 51.83.32.88 port 59494
Aug  7 09:19:54 mail sshd\[16876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.32.88
...
2019-08-07 16:40:47
27.154.225.186 attack
Aug  7 10:08:04 localhost sshd\[837\]: Invalid user misson from 27.154.225.186 port 59364
Aug  7 10:08:04 localhost sshd\[837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.154.225.186
Aug  7 10:08:06 localhost sshd\[837\]: Failed password for invalid user misson from 27.154.225.186 port 59364 ssh2
2019-08-07 16:39:05
103.104.17.139 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-08-07 17:03:12
190.64.68.178 attackspambots
Aug  7 10:39:06 lnxded64 sshd[6995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.68.178
2019-08-07 16:43:38
54.153.53.216 attackbotsspam
port scan and connect, tcp 119 (nntp)
2019-08-07 16:47:05
218.92.0.194 attackspam
2019-08-07T08:32:20.650854abusebot-8.cloudsearch.cf sshd\[9157\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.194  user=root
2019-08-07 16:41:21
202.154.159.204 attack
Aug  7 09:01:52 MK-Soft-Root1 sshd\[8806\]: Invalid user mooon from 202.154.159.204 port 50242
Aug  7 09:01:52 MK-Soft-Root1 sshd\[8806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.154.159.204
Aug  7 09:01:54 MK-Soft-Root1 sshd\[8806\]: Failed password for invalid user mooon from 202.154.159.204 port 50242 ssh2
...
2019-08-07 16:56:42
54.255.201.28 attackbotsspam
GET /manager/html
2019-08-07 17:28:06
207.244.70.35 attackspambots
$f2bV_matches
2019-08-07 16:51:53

Recently Reported IPs

248.151.144.2 138.46.143.7 199.22.239.160 141.20.37.108
41.65.91.171 220.232.180.142 78.49.144.72 160.128.63.15
187.46.138.36 82.21.199.01 49.29.185.217 239.127.54.121
202.76.4.122 252.193.213.133 87.215.103.92 16.234.2.2
35.191.166.67 35.36.230.146 135.213.61.225 229.184.204.7