Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.224.69.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9971
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.224.69.145.			IN	A

;; AUTHORITY SECTION:
.			185	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 20:57:02 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 145.69.224.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.69.224.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
85.191.126.130 attackbots
RDP Bruteforce
2019-07-06 16:08:19
189.95.16.103 attackspam
2019-07-06T03:46:11.452605abusebot-3.cloudsearch.cf sshd\[9654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189-95-16-103.3g.claro.net.br  user=root
2019-07-06 16:04:49
66.249.66.204 attackbots
\[Sat Jul 06 05:46:06.205506 2019\] \[access_compat:error\] \[pid 7253:tid 139998502295296\] \[client 66.249.66.204:42694\] AH01797: client denied by server configuration: /var/www/lug/xmlrpc.php
...
2019-07-06 16:07:01
144.217.170.65 attackbotsspam
Jul  6 05:04:34 localhost sshd\[11600\]: Invalid user oh from 144.217.170.65 port 55860
Jul  6 05:04:34 localhost sshd\[11600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.170.65
Jul  6 05:04:36 localhost sshd\[11600\]: Failed password for invalid user oh from 144.217.170.65 port 55860 ssh2
Jul  6 05:06:42 localhost sshd\[11660\]: Invalid user jennifer from 144.217.170.65 port 53112
Jul  6 05:06:42 localhost sshd\[11660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.170.65
...
2019-07-06 15:20:52
90.151.83.146 attack
2019-07-03 17:18:30 H=([90.151.83.146]) [90.151.83.146]:5829 I=[10.100.18.21]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=90.151.83.146)
2019-07-03 17:18:30 unexpected disconnection while reading SMTP command from ([90.151.83.146]) [90.151.83.146]:5829 I=[10.100.18.21]:25 (error: Connection reset by peer)
2019-07-03 19:06:53 H=([90.151.83.146]) [90.151.83.146]:23090 I=[10.100.18.21]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=90.151.83.146)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=90.151.83.146
2019-07-06 15:38:38
198.50.150.83 attackbots
$f2bV_matches
2019-07-06 15:31:39
168.0.83.206 attackbots
Honeypot attack, port: 23, PTR: dynamic-168-0-83-206.xingutelecom.com.br.
2019-07-06 15:20:29
193.179.134.5 attackbotsspam
Jul  6 08:02:14 MainVPS sshd[3169]: Invalid user 1111 from 193.179.134.5 port 58988
Jul  6 08:02:14 MainVPS sshd[3169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.179.134.5
Jul  6 08:02:14 MainVPS sshd[3169]: Invalid user 1111 from 193.179.134.5 port 58988
Jul  6 08:02:17 MainVPS sshd[3169]: Failed password for invalid user 1111 from 193.179.134.5 port 58988 ssh2
Jul  6 08:05:49 MainVPS sshd[3431]: Invalid user bolognesi from 193.179.134.5 port 42880
...
2019-07-06 15:25:17
118.24.28.39 attackspambots
Jul  6 09:20:36 ubuntu-2gb-nbg1-dc3-1 sshd[13343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.28.39
Jul  6 09:20:39 ubuntu-2gb-nbg1-dc3-1 sshd[13343]: Failed password for invalid user irina from 118.24.28.39 port 39910 ssh2
...
2019-07-06 16:01:25
196.44.99.234 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-06 15:33:46
104.248.211.180 attack
'Fail2Ban'
2019-07-06 15:36:08
171.235.50.173 attackspambots
Honeypot attack, port: 445, PTR: dynamic-ip-adsl.viettel.vn.
2019-07-06 15:23:18
212.156.58.34 attack
Autoban   212.156.58.34 AUTH/CONNECT
2019-07-06 15:43:29
188.78.187.167 attackspam
2019-07-03 18:58:32 H=167.187.78.188.dynamic.jazztel.es [188.78.187.167]:12090 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=188.78.187.167)
2019-07-03 18:58:33 unexpected disconnection while reading SMTP command from 167.187.78.188.dynamic.jazztel.es [188.78.187.167]:12090 I=[10.100.18.22]:25 (error: Connection reset by peer)
2019-07-03 19:09:02 H=167.187.78.188.dynamic.jazztel.es [188.78.187.167]:13134 I=[10.100.18.22]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=188.78.187.167)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=188.78.187.167
2019-07-06 15:45:39
170.81.23.18 attack
SSH invalid-user multiple login try
2019-07-06 15:27:01

Recently Reported IPs

29.153.232.105 141.177.72.25 148.35.101.69 133.157.83.168
137.96.190.99 11.5.173.49 120.225.117.158 146.187.90.84
12.223.88.160 138.219.253.251 155.127.78.6 197.22.112.224
17.136.130.15 14.58.230.63 130.225.177.177 136.4.239.221
137.41.6.132 130.148.59.237 205.32.168.57 120.39.82.179