Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.215.104.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14079
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.215.104.209.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 10:50:49 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 209.104.215.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 209.104.215.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.27.158.16 attackspambots
Failed password for invalid user temp from 201.27.158.16 port 58464 ssh2
2020-07-27 12:02:16
36.152.38.149 attackspambots
Jul 27 06:49:54 pkdns2 sshd\[10878\]: Invalid user usv from 36.152.38.149Jul 27 06:49:56 pkdns2 sshd\[10878\]: Failed password for invalid user usv from 36.152.38.149 port 34708 ssh2Jul 27 06:53:26 pkdns2 sshd\[11156\]: Invalid user gea from 36.152.38.149Jul 27 06:53:28 pkdns2 sshd\[11156\]: Failed password for invalid user gea from 36.152.38.149 port 39170 ssh2Jul 27 06:57:01 pkdns2 sshd\[11298\]: Invalid user toni from 36.152.38.149Jul 27 06:57:02 pkdns2 sshd\[11298\]: Failed password for invalid user toni from 36.152.38.149 port 43636 ssh2
...
2020-07-27 12:06:04
122.52.48.92 attackspam
Scanned 3 times in the last 24 hours on port 22
2020-07-27 08:16:43
157.245.124.160 attack
$f2bV_matches
2020-07-27 12:18:29
45.11.99.60 attackbotsspam
From failemail@ultramaster.live Mon Jul 27 00:56:57 2020
Received: from ultramx9.ultramaster.live ([45.11.99.60]:45339)
2020-07-27 12:08:17
60.29.31.98 attackbots
Brute-force attempt banned
2020-07-27 08:03:51
80.82.77.240 attackspambots
Portscan detected
2020-07-27 12:04:41
104.168.169.143 attack
E-Mail Spam (RBL) [REJECTED]
2020-07-27 12:09:25
5.188.84.104 attackbotsspam
IP: 5.188.84.104
Ports affected
    HTTP protocol over TLS/SSL (443) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS34665 Petersburg Internet Network ltd.
   Russia (RU)
   CIDR 5.188.84.0/24
Log Date: 26/07/2020 7:29:03 PM UTC
2020-07-27 08:10:02
106.52.96.247 attack
Invalid user ftpuser from 106.52.96.247 port 55172
2020-07-27 08:17:03
181.129.32.138 attackbotsspam
Unauthorized connection attempt from IP address 181.129.32.138 on port 465
2020-07-27 08:12:53
103.6.244.158 attack
103.6.244.158 - - [27/Jul/2020:01:27:54 +0200] "GET /wp-login.php HTTP/1.1" 200 5738 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.6.244.158 - - [27/Jul/2020:01:27:57 +0200] "POST /wp-login.php HTTP/1.1" 200 5989 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.6.244.158 - - [27/Jul/2020:01:27:58 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-07-27 08:00:24
152.231.140.150 attackbotsspam
SSH brute force
2020-07-27 08:18:16
41.79.19.82 attackbots
SASL Brute force login attack
2020-07-27 08:11:59
51.158.118.70 attackspambots
2020-07-27T01:20:23+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-07-27 08:19:41

Recently Reported IPs

212.195.21.181 224.222.52.4 170.99.59.150 201.80.157.162
27.128.64.110 32.239.185.25 236.48.48.10 231.21.210.234
96.174.208.253 253.222.204.218 16.1.138.167 40.245.237.187
80.85.188.79 28.184.17.39 188.197.64.230 38.99.104.37
218.211.221.55 96.28.209.244 88.143.182.121 233.49.252.251