Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.254.196.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23852
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.254.196.207.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:38:32 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 207.196.254.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.196.254.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.213.42.20 attackbots
SSH Brute Force, server-1 sshd[29465]: Failed password for invalid user hbs from 129.213.42.20 port 35456 ssh2
2020-01-12 01:46:58
134.175.46.166 attackbots
Jan 11 09:04:49 Tower sshd[13475]: Connection from 134.175.46.166 port 56170 on 192.168.10.220 port 22 rdomain ""
Jan 11 09:04:51 Tower sshd[13475]: Failed password for root from 134.175.46.166 port 56170 ssh2
Jan 11 09:04:51 Tower sshd[13475]: Received disconnect from 134.175.46.166 port 56170:11: Bye Bye [preauth]
Jan 11 09:04:51 Tower sshd[13475]: Disconnected from authenticating user root 134.175.46.166 port 56170 [preauth]
2020-01-12 01:04:59
159.192.157.216 attackbots
port scan and connect, tcp 22 (ssh)
2020-01-12 01:12:23
202.5.37.51 attackbots
MONDIAL RELAY - COLIS
2020-01-12 01:09:21
128.199.180.123 attack
WordPress login Brute force / Web App Attack on client site.
2020-01-12 01:22:38
130.211.246.128 attackspambots
Jan 11 12:22:53 onepro2 sshd[17580]: Failed password for invalid user postgres from 130.211.246.128 port 53784 ssh2
Jan 11 12:26:21 onepro2 sshd[17582]: Failed password for invalid user scaner from 130.211.246.128 port 45560 ssh2
Jan 11 12:29:58 onepro2 sshd[17588]: Failed password for invalid user oracle1 from 130.211.246.128 port 37358 ssh2
2020-01-12 01:33:33
134.175.192.246 attack
$f2bV_matches
2020-01-12 01:07:45
132.232.132.103 attack
$f2bV_matches
2020-01-12 01:23:26
109.70.100.20 attackspambots
0,58-01/01 [bc01/m22] PostRequest-Spammer scoring: maputo01_x2b
2020-01-12 01:11:51
222.186.175.215 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Failed password for root from 222.186.175.215 port 40256 ssh2
Failed password for root from 222.186.175.215 port 40256 ssh2
Failed password for root from 222.186.175.215 port 40256 ssh2
Failed password for root from 222.186.175.215 port 40256 ssh2
2020-01-12 01:18:07
132.248.192.9 attackspam
$f2bV_matches
2020-01-12 01:15:33
79.133.6.141 attack
SSH invalid-user multiple login attempts
2020-01-12 01:06:35
132.232.4.33 attackbotsspam
Jan 11 17:31:47 MK-Soft-Root2 sshd[31495]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.4.33 
Jan 11 17:31:50 MK-Soft-Root2 sshd[31495]: Failed password for invalid user PlcmSpIp from 132.232.4.33 port 41070 ssh2
...
2020-01-12 01:19:05
131.221.97.70 attack
$f2bV_matches
2020-01-12 01:28:50
134.175.7.36 attack
$f2bV_matches
2020-01-12 01:05:22

Recently Reported IPs

7.216.25.33 211.92.183.48 196.7.205.196 48.134.11.14
150.97.246.210 68.7.42.28 109.255.168.203 99.56.81.186
38.25.197.161 74.22.181.172 129.104.14.18 221.71.37.151
25.108.132.217 204.53.148.232 237.210.77.136 49.137.205.72
216.55.17.25 194.250.233.236 45.211.93.33 126.152.227.52