Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.204.19.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20613
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.204.19.108.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 23:30:27 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 108.19.204.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.19.204.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
142.44.184.156 attackspambots
Jan  4 06:58:06 ns381471 sshd[8578]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.184.156
Jan  4 06:58:08 ns381471 sshd[8578]: Failed password for invalid user ttest from 142.44.184.156 port 55928 ssh2
2020-01-04 15:25:57
125.212.233.50 attackbots
Jan  4 08:06:36 plex sshd[1873]: Invalid user wang from 125.212.233.50 port 52090
2020-01-04 15:42:15
139.155.118.190 attack
$f2bV_matches
2020-01-04 15:33:03
41.249.206.175 attackbotsspam
Automatic report - Port Scan Attack
2020-01-04 15:55:03
185.216.140.70 attackspam
Unauthorized connection attempt detected from IP address 185.216.140.70 to port 3389
2020-01-04 15:34:24
185.209.0.51 attack
ET DROP Dshield Block Listed Source group 1 - port: 12389 proto: TCP cat: Misc Attack
2020-01-04 15:26:24
184.179.216.156 attackbots
B: Magento admin pass test (wrong country)
2020-01-04 15:39:21
113.176.89.116 attackbots
Jan  4 07:23:34 server sshd\[11923\]: Invalid user thierry1129 from 113.176.89.116
Jan  4 07:23:34 server sshd\[11923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.89.116 
Jan  4 07:23:37 server sshd\[11923\]: Failed password for invalid user thierry1129 from 113.176.89.116 port 39084 ssh2
Jan  4 07:52:17 server sshd\[18582\]: Invalid user mhe from 113.176.89.116
Jan  4 07:52:17 server sshd\[18582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.176.89.116 
...
2020-01-04 15:54:27
223.241.78.126 attack
Jan  4 05:52:50 grey postfix/smtpd\[11909\]: NOQUEUE: reject: RCPT from unknown\[223.241.78.126\]: 554 5.7.1 Service unavailable\; Client host \[223.241.78.126\] blocked using dul.dnsbl.sorbs.net\; Dynamic IP Addresses See: http://www.sorbs.net/lookup.shtml\?223.241.78.126\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-04 15:37:12
36.255.87.181 attackspam
invalid user
2020-01-04 15:35:02
103.97.179.6 attackspambots
Caught in portsentry honeypot
2020-01-04 15:35:51
62.234.97.139 attackbotsspam
Invalid user oracle from 62.234.97.139 port 43346
2020-01-04 15:30:11
196.45.144.68 attack
Unauthorized connection attempt detected from IP address 196.45.144.68 to port 1433
2020-01-04 15:48:02
203.130.192.242 attackbotsspam
5x Failed Password
2020-01-04 15:57:32
138.197.146.132 attack
Automatic report - XMLRPC Attack
2020-01-04 15:53:31

Recently Reported IPs

162.171.46.235 19.194.79.87 232.142.255.190 226.123.24.183
53.143.154.88 229.145.68.229 207.75.166.112 12.204.106.109
9.202.240.164 69.169.252.55 228.28.134.50 6.150.148.180
116.60.90.68 126.126.17.63 233.123.66.49 118.29.252.8
34.144.247.191 229.7.211.118 138.127.246.110 192.209.26.218