Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.166.98.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19277
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.166.98.122.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021201 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 02:40:17 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 122.98.166.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 122.98.166.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.175.93.104 attackspambots
05/23/2020-04:10:30.531378 185.175.93.104 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-23 16:19:21
171.6.232.96 attack
Invalid user r00t from 171.6.232.96 port 59755
2020-05-23 16:36:18
185.153.199.211 attackbotsspam
firewall-block, port(s): 3389/tcp, 3390/tcp
2020-05-23 16:21:21
190.5.242.114 attack
Invalid user ljn from 190.5.242.114 port 33926
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.5.242.114
Failed password for invalid user ljn from 190.5.242.114 port 33926 ssh2
Invalid user hourunping from 190.5.242.114 port 51255
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.5.242.114
2020-05-23 16:16:35
180.151.61.46 attackspam
Invalid user lfx from 180.151.61.46 port 58284
2020-05-23 16:27:34
184.22.65.181 attackspambots
Invalid user r00t from 184.22.65.181 port 61972
2020-05-23 16:24:45
167.99.48.123 attack
Invalid user dho from 167.99.48.123 port 58876
2020-05-23 16:36:47
185.53.88.207 attackspambots
ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak
2020-05-23 16:23:48
188.26.236.237 attackspambots
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 16:18:19
180.182.228.195 attack
SmallBizIT.US 1 packets to tcp(2323)
2020-05-23 16:27:09
195.54.167.120 attackbots
Port scan on 3 port(s): 4203 4208 4212
2020-05-23 16:08:09
128.199.112.60 attack
$f2bV_matches
2020-05-23 16:49:09
139.59.85.120 attackspam
5x Failed Password
2020-05-23 16:46:09
195.54.166.224 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 5857 proto: TCP cat: Misc Attack
2020-05-23 16:08:59
190.145.192.106 attack
Invalid user aha from 190.145.192.106 port 37948
2020-05-23 16:15:57

Recently Reported IPs

247.189.76.68 100.234.228.9 165.224.76.140 179.208.81.83
150.197.34.212 224.107.140.78 173.96.29.173 21.94.54.196
72.203.98.68 107.58.136.224 129.44.100.91 56.144.50.94
124.8.34.14 155.55.151.141 57.254.195.244 242.160.78.150
210.12.50.190 18.0.65.135 7.237.241.152 202.161.225.22