Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.192.61.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.192.61.157.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020201 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 10:35:22 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 157.61.192.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 157.61.192.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.134.227.180 attackbotsspam
Invalid user kaiju from 91.134.227.180 port 50824
2019-08-23 15:32:36
201.55.199.143 attack
Aug 22 21:38:02 eddieflores sshd\[1200\]: Invalid user 123456 from 201.55.199.143
Aug 22 21:38:02 eddieflores sshd\[1200\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.199.143
Aug 22 21:38:04 eddieflores sshd\[1200\]: Failed password for invalid user 123456 from 201.55.199.143 port 43434 ssh2
Aug 22 21:46:22 eddieflores sshd\[2015\]: Invalid user cgb from 201.55.199.143
Aug 22 21:46:22 eddieflores sshd\[2015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.55.199.143
2019-08-23 15:46:39
45.70.167.248 attack
Invalid user rhine from 45.70.167.248 port 41698
2019-08-23 15:39:51
84.242.96.142 attackbotsspam
Aug 23 09:53:14 mail sshd\[26519\]: Invalid user john from 84.242.96.142 port 42662
Aug 23 09:53:14 mail sshd\[26519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.242.96.142
Aug 23 09:53:15 mail sshd\[26519\]: Failed password for invalid user john from 84.242.96.142 port 42662 ssh2
Aug 23 09:57:43 mail sshd\[27540\]: Invalid user slb from 84.242.96.142 port 59532
Aug 23 09:57:43 mail sshd\[27540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.242.96.142
2019-08-23 16:07:31
162.248.54.39 attack
Aug 22 22:11:58 web9 sshd\[20359\]: Invalid user ic1 from 162.248.54.39
Aug 22 22:11:58 web9 sshd\[20359\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.54.39
Aug 22 22:12:00 web9 sshd\[20359\]: Failed password for invalid user ic1 from 162.248.54.39 port 36486 ssh2
Aug 22 22:16:16 web9 sshd\[21195\]: Invalid user visuelconcept from 162.248.54.39
Aug 22 22:16:16 web9 sshd\[21195\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.248.54.39
2019-08-23 16:28:24
187.201.142.115 attack
Invalid user dipap from 187.201.142.115 port 36516
2019-08-23 15:48:38
116.196.83.143 attack
Bruteforce on SSH Honeypot
2019-08-23 15:59:32
87.67.62.105 attackbotsspam
Invalid user prueba from 87.67.62.105 port 45684
2019-08-23 16:06:53
111.197.145.171 attackbotsspam
Invalid user admin from 111.197.145.171 port 58319
2019-08-23 15:28:11
117.50.66.233 attack
Invalid user heather from 117.50.66.233 port 58934
2019-08-23 15:58:56
202.70.80.27 attackspam
Invalid user newsletter from 202.70.80.27 port 40606
2019-08-23 15:46:09
80.211.133.145 attackspambots
Invalid user support from 80.211.133.145 port 48378
2019-08-23 16:08:42
128.199.137.252 attackspambots
Invalid user mcserv from 128.199.137.252 port 51580
2019-08-23 15:25:08
218.200.46.3 attackbots
Invalid user timo from 218.200.46.3 port 43982
2019-08-23 15:43:07
66.155.18.238 attackspam
Invalid user app from 66.155.18.238 port 38018
2019-08-23 15:36:50

Recently Reported IPs

9.103.142.211 187.229.20.67 240.134.120.69 137.171.214.15
231.193.157.34 209.47.191.79 44.191.33.81 166.234.20.12
97.91.58.142 75.65.15.172 57.227.134.164 126.166.29.139
139.60.149.120 222.246.197.16 110.45.36.86 237.154.182.123
130.114.78.12 33.181.46.97 208.112.33.189 99.111.95.255