Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.206.51.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5120
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.206.51.118.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 05:00:23 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 118.51.206.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 118.51.206.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.28.23.93 attackbotsspam
port scan and connect, tcp 23 (telnet)
2019-06-22 14:26:34
209.17.96.210 attackspam
Automatic report - Web App Attack
2019-06-22 14:58:15
177.23.77.58 attack
SMTP-sasl brute force
...
2019-06-22 15:06:11
118.172.123.88 attackbots
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-22 06:36:33]
2019-06-22 14:08:55
27.158.48.170 attack
postfix-failedauth jail [dl]
2019-06-22 14:23:22
115.144.244.116 attack
3389BruteforceFW23
2019-06-22 14:17:31
106.41.140.149 attackbotsspam
Telnet Server BruteForce Attack
2019-06-22 14:40:39
18.85.192.253 attackspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=18.85.192.253  user=root
Failed password for root from 18.85.192.253 port 54560 ssh2
Failed password for root from 18.85.192.253 port 54560 ssh2
Failed password for root from 18.85.192.253 port 54560 ssh2
Failed password for root from 18.85.192.253 port 54560 ssh2
2019-06-22 14:39:04
124.13.87.169 attackspam
20 attempts against mh-ssh on mist.magehost.pro
2019-06-22 14:30:27
185.100.87.248 attackspambots
port scan and connect, tcp 5060 (sip)
2019-06-22 14:20:57
92.118.161.61 attackbots
3389BruteforceFW21
2019-06-22 14:28:16
107.173.219.143 attackspam
Unauthorised access (Jun 22) SRC=107.173.219.143 LEN=40 TTL=239 ID=52870 TCP DPT=445 WINDOW=1024 SYN 
Unauthorised access (Jun 17) SRC=107.173.219.143 LEN=40 TTL=239 ID=43635 TCP DPT=445 WINDOW=1024 SYN
2019-06-22 14:54:54
23.228.110.106 attackbotsspam
SS1,DEF GET /wp-content/themes/rayoflight/functions/upload-handler.php
2019-06-22 14:57:41
198.23.189.18 attackbotsspam
Automatic report - Web App Attack
2019-06-22 14:19:26
116.255.174.29 attack
POST //Config_Shell.php HTTP/1.1 etc.
2019-06-22 15:07:05

Recently Reported IPs

199.189.232.248 223.106.192.255 192.28.68.121 80.5.27.60
180.67.150.61 221.168.33.6 33.164.177.213 212.40.112.33
195.59.81.174 28.108.186.68 77.108.226.151 140.168.113.212
44.81.96.155 9.208.179.4 29.31.217.149 80.19.36.74
2.149.205.96 12.160.144.223 13.233.203.115 224.58.148.29