Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.224.227.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36838
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.224.227.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 04:09:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 7.227.224.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.227.224.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.27.228.154 attackbots
scans 16 times in preceeding hours on the ports (in chronological order) 4782 4721 3588 5177 4596 3784 4662 5156 5072 5493 4490 5079 4620 5262 5500 4785 resulting in total of 51 scans from 193.27.228.0/23 block.
2020-10-01 07:02:29
92.118.161.21 attackbotsspam
Port Scan/VNC login attempt
...
2020-10-01 06:45:49
94.102.56.216 attackspam
94.102.56.216 was recorded 6 times by 4 hosts attempting to connect to the following ports: 7659,7748. Incident counter (4h, 24h, all-time): 6, 26, 2934
2020-10-01 07:09:24
120.194.194.86 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-10-01 06:38:59
42.112.37.242 attackspam
 TCP (SYN) 42.112.37.242:49422 -> port 6016, len 44
2020-10-01 06:57:17
66.240.205.34 attack
 TCP (SYN) 66.240.205.34:18081 -> port 1800, len 44
2020-10-01 06:51:58
104.206.128.38 attack
 TCP (SYN) 104.206.128.38:61435 -> port 1433, len 44
2020-10-01 07:08:03
92.118.160.9 attackbotsspam
" "
2020-10-01 07:11:35
213.184.254.128 attack
445/tcp 1433/tcp...
[2020-08-04/09-29]7pkt,2pt.(tcp)
2020-10-01 06:35:43
193.27.228.172 attack
Port-scan: detected 211 distinct ports within a 24-hour window.
2020-10-01 07:02:00
114.113.81.130 attack
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-01 06:39:34
185.193.90.54 attackbots
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-01 07:03:33
104.244.79.181 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 95 - port: 8080 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 06:41:29
45.143.221.85 attackspambots
" "
2020-10-01 06:54:36
104.255.10.92 attack
firewall-block, port(s): 445/tcp
2020-10-01 07:07:01

Recently Reported IPs

89.252.80.201 85.89.143.149 82.73.170.154 103.252.3.218
49.117.114.1 42.198.230.104 45.158.52.46 126.239.254.131
146.24.123.149 79.174.253.129 25.41.211.219 43.86.83.167
127.32.127.175 31.157.232.230 7.23.76.120 122.37.141.61
84.218.146.140 164.136.67.252 18.241.42.59 125.109.113.210