Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.204.144.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19520
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.204.144.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 01:45:51 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 39.144.204.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 39.144.204.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
134.73.206.59 attack
k+ssh-bruteforce
2020-04-22 03:40:44
183.109.79.253 attack
DATE:2020-04-21 21:15:59, IP:183.109.79.253, PORT:ssh SSH brute force auth (docker-dc)
2020-04-22 03:26:11
117.7.204.67 attackbotsspam
Invalid user admin from 117.7.204.67 port 46687
2020-04-22 03:52:12
118.25.226.152 attack
$f2bV_matches
2020-04-22 03:50:51
128.199.52.45 attackbotsspam
Invalid user ftpuser from 128.199.52.45 port 56658
2020-04-22 03:45:10
45.81.150.20 attackspam
Brute forcing email accounts
2020-04-22 04:02:43
138.197.110.41 attack
Invalid user git from 138.197.110.41 port 46246
2020-04-22 03:38:59
172.81.253.97 attack
Apr 21 20:36:36 vserver sshd\[17148\]: Invalid user test from 172.81.253.97Apr 21 20:36:37 vserver sshd\[17148\]: Failed password for invalid user test from 172.81.253.97 port 39304 ssh2Apr 21 20:40:33 vserver sshd\[17209\]: Invalid user admin from 172.81.253.97Apr 21 20:40:35 vserver sshd\[17209\]: Failed password for invalid user admin from 172.81.253.97 port 51276 ssh2
...
2020-04-22 03:31:00
113.162.155.213 attackspambots
Invalid user admin from 113.162.155.213 port 56655
2020-04-22 03:54:13
113.162.153.213 attack
Invalid user admin from 113.162.153.213 port 44754
2020-04-22 03:54:43
181.40.76.162 attack
Apr 21 18:32:03 mail sshd\[23337\]: Invalid user lu from 181.40.76.162
Apr 21 18:32:03 mail sshd\[23337\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.76.162
Apr 21 18:32:04 mail sshd\[23337\]: Failed password for invalid user lu from 181.40.76.162 port 34300 ssh2
...
2020-04-22 03:27:56
117.50.140.230 attack
Invalid user rr from 117.50.140.230 port 39059
2020-04-22 03:51:46
125.69.68.125 attackbotsspam
Apr 21 21:21:19 pkdns2 sshd\[52820\]: Invalid user test1 from 125.69.68.125Apr 21 21:21:22 pkdns2 sshd\[52820\]: Failed password for invalid user test1 from 125.69.68.125 port 47675 ssh2Apr 21 21:24:27 pkdns2 sshd\[52958\]: Failed password for root from 125.69.68.125 port 35811 ssh2Apr 21 21:28:06 pkdns2 sshd\[53155\]: Invalid user cz from 125.69.68.125Apr 21 21:28:08 pkdns2 sshd\[53155\]: Failed password for invalid user cz from 125.69.68.125 port 36496 ssh2Apr 21 21:31:14 pkdns2 sshd\[53311\]: Failed password for root from 125.69.68.125 port 28478 ssh2
...
2020-04-22 03:45:33
111.231.33.135 attack
Apr 21 21:47:01 srv01 sshd[16020]: Invalid user ftpuser from 111.231.33.135 port 48150
Apr 21 21:47:01 srv01 sshd[16020]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.33.135
Apr 21 21:47:01 srv01 sshd[16020]: Invalid user ftpuser from 111.231.33.135 port 48150
Apr 21 21:47:04 srv01 sshd[16020]: Failed password for invalid user ftpuser from 111.231.33.135 port 48150 ssh2
Apr 21 21:51:11 srv01 sshd[16427]: Invalid user auth from 111.231.33.135 port 46896
...
2020-04-22 03:59:05
182.61.45.42 attackbotsspam
Invalid user postgres from 182.61.45.42 port 24635
2020-04-22 03:26:59

Recently Reported IPs

202.134.91.225 173.229.88.242 124.102.245.115 165.213.205.56
71.162.96.252 99.58.69.108 151.185.93.44 178.20.57.117
27.119.251.253 157.14.2.71 67.111.252.142 207.229.0.157
213.193.164.179 25.220.19.135 44.144.132.198 30.240.129.113
76.205.72.189 65.20.0.226 53.90.179.219 91.6.197.33