Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.174.83.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36215
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.174.83.0.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 06:40:34 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 0.83.174.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.83.174.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.142.117.152 attackbotsspam
Total attacks: 2
2019-07-27 14:46:02
46.3.96.70 attackspambots
Port scan: Attack repeated for 24 hours
2019-07-27 14:18:25
200.27.18.242 attack
proto=tcp  .  spt=51980  .  dpt=25  .     (listed on Blocklist de  Jul 26)     (277)
2019-07-27 14:18:05
111.231.121.62 attack
DATE:2019-07-27 07:13:14, IP:111.231.121.62, PORT:ssh brute force auth on SSH service (patata)
2019-07-27 15:00:02
190.106.223.1 attackbots
TCP Port: 25 _    invalid blocked abuseat-org barracudacentral _  _  _ _ (257)
2019-07-27 15:07:10
148.251.125.12 attack
20 attempts against mh-misbehave-ban on plane.magehost.pro
2019-07-27 14:29:49
61.19.242.135 attackspambots
Jul 27 08:51:09 hosting sshd[7092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.19.242.135  user=root
Jul 27 08:51:11 hosting sshd[7092]: Failed password for root from 61.19.242.135 port 41180 ssh2
...
2019-07-27 15:04:11
177.23.138.222 attack
TCP Port: 25 _    invalid blocked dnsbl-sorbs abuseat-org _  _  _ _ (262)
2019-07-27 14:48:04
213.13.44.78 attackspam
TCP Port: 25 _    invalid blocked dnsbl-sorbs abuseat-org _  _  _ _ (263)
2019-07-27 14:46:55
139.59.226.82 attackspam
Jul 27 08:43:21 vps647732 sshd[21144]: Failed password for root from 139.59.226.82 port 44534 ssh2
...
2019-07-27 15:03:53
104.248.8.60 attackbotsspam
rain
2019-07-27 14:22:35
128.199.221.18 attackspambots
Jul 27 01:06:13 askasleikir sshd[19272]: Failed password for invalid user applmgr from 128.199.221.18 port 45428 ssh2
2019-07-27 14:48:38
139.199.29.155 attackbotsspam
[ssh] SSH attack
2019-07-27 14:20:18
139.99.123.74 attackbots
Automatic report - Banned IP Access
2019-07-27 14:04:39
178.216.64.11 attackbots
[portscan] Port scan
2019-07-27 14:15:33

Recently Reported IPs

99.122.111.155 216.108.9.215 127.66.1.153 119.130.165.18
185.83.48.135 226.35.74.252 91.153.101.105 211.152.75.203
244.235.254.11 235.39.171.186 195.44.190.104 243.248.15.226
227.42.152.255 241.82.75.141 121.58.166.104 185.158.124.177
101.72.40.201 14.147.122.112 254.166.77.89 128.236.181.131