Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.227.107.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4372
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.227.107.128.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 18:09:51 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 128.107.227.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 128.107.227.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.30.167 attackspam
Jun 2 23:13:13 *host* sshd\[24645\]: User *user* from 222.186.30.167 not allowed because none of user's groups are listed in AllowGroups
2020-06-03 05:16:04
94.191.14.213 attackspambots
Jun  2 13:44:10 mockhub sshd[18938]: Failed password for root from 94.191.14.213 port 59524 ssh2
...
2020-06-03 05:39:51
111.229.205.95 attack
Jun  2 22:52:23 home sshd[16086]: Failed password for root from 111.229.205.95 port 53264 ssh2
Jun  2 22:54:27 home sshd[16274]: Failed password for root from 111.229.205.95 port 57356 ssh2
...
2020-06-03 05:20:44
114.119.163.68 attackbotsspam
Automatic report - Banned IP Access
2020-06-03 05:47:59
23.236.62.147 attackspam
From : 17324847254@gurneecpa.com
Name of Sender : +17324847254@mymetrofaxpcs.com
Sender MailID : 17324847254@gurneecpa.com
2020-06-03 05:30:57
202.152.1.89 attackbots
Fail2Ban Ban Triggered
2020-06-03 05:48:59
14.29.193.198 attackspam
Jun  2 23:14:19 piServer sshd[22184]: Failed password for root from 14.29.193.198 port 41462 ssh2
Jun  2 23:17:19 piServer sshd[22446]: Failed password for root from 14.29.193.198 port 33104 ssh2
...
2020-06-03 05:21:15
191.232.55.166 attackbotsspam
Jun  2 20:01:30 XXX sshd[22274]: Invalid user student from 191.232.55.166 port 52872
2020-06-03 05:34:54
106.12.12.152 attackbots
Jun  2 23:13:59 piServer sshd[22161]: Failed password for root from 106.12.12.152 port 48488 ssh2
Jun  2 23:17:34 piServer sshd[22469]: Failed password for root from 106.12.12.152 port 43776 ssh2
...
2020-06-03 05:25:45
178.32.221.225 attackbots
Jun  2 23:02:50 [host] sshd[20233]: pam_unix(sshd:
Jun  2 23:02:52 [host] sshd[20233]: Failed passwor
Jun  2 23:08:40 [host] sshd[20460]: pam_unix(sshd:
2020-06-03 05:25:06
51.68.212.114 attackspam
Jun  2 15:10:31 server1 sshd\[28503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.212.114  user=root
Jun  2 15:10:33 server1 sshd\[28503\]: Failed password for root from 51.68.212.114 port 49570 ssh2
Jun  2 15:14:23 server1 sshd\[29812\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.212.114  user=root
Jun  2 15:14:25 server1 sshd\[29812\]: Failed password for root from 51.68.212.114 port 54472 ssh2
Jun  2 15:18:13 server1 sshd\[31324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.212.114  user=root
...
2020-06-03 05:28:16
218.164.219.178 attack
Port Scan detected!
...
2020-06-03 05:31:52
222.186.180.142 attack
Jun  2 23:38:21 minden010 sshd[27398]: Failed password for root from 222.186.180.142 port 40429 ssh2
Jun  2 23:38:23 minden010 sshd[27398]: Failed password for root from 222.186.180.142 port 40429 ssh2
Jun  2 23:38:26 minden010 sshd[27398]: Failed password for root from 222.186.180.142 port 40429 ssh2
...
2020-06-03 05:38:40
165.227.135.34 attackbots
2020-06-02T21:37:55.959007shield sshd\[3276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.135.34  user=root
2020-06-02T21:37:57.742576shield sshd\[3276\]: Failed password for root from 165.227.135.34 port 52928 ssh2
2020-06-02T21:41:13.786264shield sshd\[3750\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.135.34  user=root
2020-06-02T21:41:16.086516shield sshd\[3750\]: Failed password for root from 165.227.135.34 port 56322 ssh2
2020-06-02T21:44:27.905991shield sshd\[4110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.135.34  user=root
2020-06-03 05:49:18
101.91.200.186 attackspambots
k+ssh-bruteforce
2020-06-03 05:48:18

Recently Reported IPs

124.245.12.113 233.204.76.56 145.24.76.48 97.219.158.203
190.180.103.11 17.188.103.228 127.9.13.37 232.105.226.229
214.63.155.164 145.25.63.98 159.204.107.50 41.201.161.156
127.136.75.177 137.207.128.27 139.71.144.247 137.176.241.57
226.101.126.97 236.195.161.213 121.159.234.51 50.54.158.51