Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.194.39.206
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29363
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.194.39.206.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 22:08:30 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 206.39.194.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 206.39.194.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.67.110.221 attackbotsspam
Apr 19 15:00:36 Enigma sshd[29554]: Failed password for invalid user gitlab from 114.67.110.221 port 55862 ssh2
Apr 19 15:02:57 Enigma sshd[29729]: Invalid user gitlab from 114.67.110.221 port 56410
Apr 19 15:02:57 Enigma sshd[29729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.110.221
Apr 19 15:02:57 Enigma sshd[29729]: Invalid user gitlab from 114.67.110.221 port 56410
Apr 19 15:03:00 Enigma sshd[29729]: Failed password for invalid user gitlab from 114.67.110.221 port 56410 ssh2
2020-04-19 22:53:02
78.128.113.42 attackspambots
Apr 19 16:14:25 debian-2gb-nbg1-2 kernel: \[9564632.663757\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=78.128.113.42 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=28936 PROTO=TCP SPT=59973 DPT=1441 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-19 22:29:53
79.137.72.171 attack
Apr 19 16:37:53 host5 sshd[16495]: Invalid user hk from 79.137.72.171 port 50585
...
2020-04-19 22:39:42
186.4.123.139 attackspambots
Total attacks: 2
2020-04-19 22:54:15
84.91.143.99 attack
Illegal actions on webapp
2020-04-19 23:02:00
192.241.239.46 attack
Unauthorized connection attempt detected from IP address 192.241.239.46 to port 5672
2020-04-19 22:25:28
157.97.80.205 attackspambots
2020-04-19T14:08:54.778775sd-86998 sshd[43104]: Invalid user cc from 157.97.80.205 port 56981
2020-04-19T14:08:54.784108sd-86998 sshd[43104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.97.80.205
2020-04-19T14:08:54.778775sd-86998 sshd[43104]: Invalid user cc from 157.97.80.205 port 56981
2020-04-19T14:08:56.465904sd-86998 sshd[43104]: Failed password for invalid user cc from 157.97.80.205 port 56981 ssh2
2020-04-19T14:16:50.619364sd-86998 sshd[43663]: Invalid user ansible from 157.97.80.205 port 38829
...
2020-04-19 22:57:00
192.241.246.207 attack
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-19 23:03:07
104.131.217.56 attackbots
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-19 22:32:17
167.71.48.57 attackbotsspam
Apr 19 14:15:27 mail sshd[22168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.48.57
Apr 19 14:15:29 mail sshd[22168]: Failed password for invalid user test from 167.71.48.57 port 40080 ssh2
Apr 19 14:19:33 mail sshd[22817]: Failed password for root from 167.71.48.57 port 57994 ssh2
2020-04-19 22:23:54
78.4.156.114 attackspam
Lines containing failures of 78.4.156.114
Apr 19 13:50:18 keyhelp sshd[5867]: Invalid user admin from 78.4.156.114 port 50273
Apr 19 13:50:18 keyhelp sshd[5867]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.4.156.114
Apr 19 13:50:20 keyhelp sshd[5867]: Failed password for invalid user admin from 78.4.156.114 port 50273 ssh2
Apr 19 13:50:20 keyhelp sshd[5867]: Connection closed by invalid user admin 78.4.156.114 port 50273 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=78.4.156.114
2020-04-19 22:49:52
2a00:1098:84::4 attack
Apr 19 15:09:09 l03 sshd[1294]: Invalid user test101 from 2a00:1098:84::4 port 47004
...
2020-04-19 22:38:50
77.55.212.26 attackspambots
Apr 19 13:40:59 rs-7 sshd[37322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.212.26  user=r.r
Apr 19 13:41:01 rs-7 sshd[37322]: Failed password for r.r from 77.55.212.26 port 39708 ssh2
Apr 19 13:41:01 rs-7 sshd[37322]: Received disconnect from 77.55.212.26 port 39708:11: Bye Bye [preauth]
Apr 19 13:41:01 rs-7 sshd[37322]: Disconnected from 77.55.212.26 port 39708 [preauth]
Apr 19 13:49:18 rs-7 sshd[38634]: Invalid user daijiabao from 77.55.212.26 port 56432
Apr 19 13:49:18 rs-7 sshd[38634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.55.212.26


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=77.55.212.26
2020-04-19 22:38:20
182.61.26.165 attackspam
Apr 19 14:03:07 sso sshd[24482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.26.165
Apr 19 14:03:08 sso sshd[24482]: Failed password for invalid user hadoopuser from 182.61.26.165 port 38764 ssh2
...
2020-04-19 22:45:42
106.13.140.83 attackbots
$f2bV_matches
2020-04-19 22:50:39

Recently Reported IPs

200.76.57.207 218.138.79.215 92.205.12.77 56.238.199.141
217.135.252.162 182.197.55.140 97.230.14.28 248.74.112.169
247.97.108.144 255.174.70.222 144.156.215.201 93.104.129.38
90.168.82.185 252.7.81.250 43.242.119.230 70.207.7.73
109.225.217.190 155.141.196.100 135.96.84.110 255.89.32.67