Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.228.9.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 760
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.228.9.196.			IN	A

;; AUTHORITY SECTION:
.			217	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022052401 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 25 05:16:05 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 196.9.228.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.9.228.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.138.29.153 attackbotsspam
Aug  6 16:22:00 mertcangokgoz-v4-main kernel: [337058.640354] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:5a:6b:04:d2:74:7f:6e:37:e3:08:00 SRC=122.138.29.153 DST=94.130.96.165 LEN=40 TOS=0x00 PREC=0x00 TTL=43 ID=12548 PROTO=TCP SPT=64626 DPT=23 WINDOW=38893 RES=0x00 SYN URGP=0
2020-08-07 01:59:16
139.155.79.24 attack
Aug  6 16:55:58 eventyay sshd[8886]: Failed password for root from 139.155.79.24 port 35226 ssh2
Aug  6 16:58:37 eventyay sshd[8954]: Failed password for root from 139.155.79.24 port 60058 ssh2
...
2020-08-07 01:50:39
64.64.104.10 attackbots
Aug  6 09:11:37 web02.agentur-b-2.de postfix/smtps/smtpd[1822866]: lost connection after CONNECT from unknown[64.64.104.10]
Aug  6 09:11:39 web02.agentur-b-2.de postfix/smtps/smtpd[1822862]: lost connection after EHLO from unknown[64.64.104.10]
Aug  6 09:11:40 web02.agentur-b-2.de postfix/smtps/smtpd[1822866]: lost connection after CONNECT from unknown[64.64.104.10]
Aug  6 09:11:40 web02.agentur-b-2.de postfix/smtps/smtpd[1822862]: lost connection after CONNECT from unknown[64.64.104.10]
Aug  6 09:11:41 web02.agentur-b-2.de postfix/smtps/smtpd[1822866]: lost connection after CONNECT from unknown[64.64.104.10]
2020-08-07 01:46:52
203.195.205.202 attackbotsspam
2020-08-06T18:42:59.343536amanda2.illicoweb.com sshd\[11593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.205.202  user=root
2020-08-06T18:43:01.093553amanda2.illicoweb.com sshd\[11593\]: Failed password for root from 203.195.205.202 port 47132 ssh2
2020-08-06T18:45:52.624565amanda2.illicoweb.com sshd\[12534\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.205.202  user=root
2020-08-06T18:45:54.791100amanda2.illicoweb.com sshd\[12534\]: Failed password for root from 203.195.205.202 port 47844 ssh2
2020-08-06T18:52:04.070532amanda2.illicoweb.com sshd\[14169\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.195.205.202  user=root
...
2020-08-07 01:32:01
49.234.119.29 attackbots
Lines containing failures of 49.234.119.29
Aug  4 11:39:03 penfold sshd[21688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.119.29  user=r.r
Aug  4 11:39:06 penfold sshd[21688]: Failed password for r.r from 49.234.119.29 port 59622 ssh2
Aug  4 11:39:08 penfold sshd[21688]: Received disconnect from 49.234.119.29 port 59622:11: Bye Bye [preauth]
Aug  4 11:39:08 penfold sshd[21688]: Disconnected from authenticating user r.r 49.234.119.29 port 59622 [preauth]
Aug  4 11:43:36 penfold sshd[22053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.119.29  user=r.r
Aug  4 11:43:38 penfold sshd[22053]: Failed password for r.r from 49.234.119.29 port 40376 ssh2
Aug  4 11:43:39 penfold sshd[22053]: Received disconnect from 49.234.119.29 port 40376:11: Bye Bye [preauth]
Aug  4 11:43:39 penfold sshd[22053]: Disconnected from authenticating user r.r 49.234.119.29 port 40376 [preauth]
Aug  4........
------------------------------
2020-08-07 02:08:58
59.144.139.18 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-08-07 01:38:58
40.80.152.26 attackspam
X-Sender-IP: 40.80.152.26
X-SID-PRA: ZAZYJNGO@EPUXGYQSY.COM
X-SID-Result: NONE
X-MS-Exchange-Organization-PCL: 2
X-Microsoft-Antispam: BCL:0;
X-Forefront-Antispam-Report:
CIP:40.80.152.26;CTRY:US;LANG:en;SCL:0;SRV:;IPV:NLI;SFV:NSPM;H:tevmtstvmtaggwp11.com;PTR:InfoDomainNonexistent;CAT:NONE;SFTY:;SFS:;DIR:INB;SFP:;
X-OriginatorOrg: outlook.com
X-MS-Exchange-CrossTenant-OriginalArrivalTime: 06 Aug 2020 11:08:30.4767
(UTC)
2020-08-07 02:07:56
51.68.44.154 attackbotsspam
Aug  6 20:01:47 OPSO sshd\[4270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.154  user=root
Aug  6 20:01:49 OPSO sshd\[4270\]: Failed password for root from 51.68.44.154 port 59594 ssh2
Aug  6 20:05:41 OPSO sshd\[5296\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.154  user=root
Aug  6 20:05:43 OPSO sshd\[5296\]: Failed password for root from 51.68.44.154 port 36979 ssh2
Aug  6 20:09:36 OPSO sshd\[5643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.44.154  user=root
2020-08-07 02:12:07
49.232.161.242 attackbotsspam
Aug  6 18:36:50 vmd26974 sshd[7134]: Failed password for root from 49.232.161.242 port 47834 ssh2
...
2020-08-07 01:48:15
91.219.58.160 attack
Aug  6 16:58:20 icinga sshd[46110]: Failed password for root from 91.219.58.160 port 53274 ssh2
Aug  6 17:08:01 icinga sshd[61127]: Failed password for root from 91.219.58.160 port 56136 ssh2
...
2020-08-07 02:02:53
106.110.235.191 attackspam
 TCP (SYN) 106.110.235.191:59403 -> port 22, len 60
2020-08-07 02:06:04
104.131.249.57 attackbots
Aug  6 17:20:44 ovpn sshd\[14252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.249.57  user=root
Aug  6 17:20:45 ovpn sshd\[14252\]: Failed password for root from 104.131.249.57 port 40972 ssh2
Aug  6 17:32:47 ovpn sshd\[20550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.249.57  user=root
Aug  6 17:32:49 ovpn sshd\[20550\]: Failed password for root from 104.131.249.57 port 38795 ssh2
Aug  6 17:36:45 ovpn sshd\[22288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.249.57  user=root
2020-08-07 01:38:31
194.26.29.166 attack
[Tue Jul 14 08:00:49 2020] - DDoS Attack From IP: 194.26.29.166 Port: 44828
2020-08-07 01:32:16
61.84.196.50 attackbots
Aug  6 16:06:55 vps647732 sshd[3297]: Failed password for root from 61.84.196.50 port 43288 ssh2
...
2020-08-07 01:47:11
111.121.27.174 attack
port scan and connect, tcp 443 (https)
2020-08-07 02:02:28

Recently Reported IPs

129.43.135.0 114.101.101.207 114.101.101.32 114.101.19.133
114.101.22.67 114.101.251.104 114.101.251.189 114.101.252.88
114.101.253.182 114.101.253.200 114.101.253.249 114.101.41.217
114.101.44.87 114.101.45.3 114.101.60.125 114.101.63.231
114.101.80.57 114.101.81.100 114.101.81.111 114.101.81.150