Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.42.132.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.42.132.51.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 17:38:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 51.132.42.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 51.132.42.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
81.247.64.98 attackbots
Oct  3 15:58:19 [host] sshd[19811]: Invalid user prueba01 from 81.247.64.98
Oct  3 15:58:19 [host] sshd[19811]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.247.64.98
Oct  3 15:58:21 [host] sshd[19811]: Failed password for invalid user prueba01 from 81.247.64.98 port 57120 ssh2
2019-10-03 23:32:17
109.244.1.6 attackbotsspam
ICMP MP Probe, Scan -
2019-10-03 23:33:29
106.11.30.5 attack
ICMP MP Probe, Scan -
2019-10-03 23:59:29
203.143.12.26 attackbots
Oct  3 17:34:22 nextcloud sshd\[4974\]: Invalid user oc from 203.143.12.26
Oct  3 17:34:22 nextcloud sshd\[4974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.143.12.26
Oct  3 17:34:23 nextcloud sshd\[4974\]: Failed password for invalid user oc from 203.143.12.26 port 5113 ssh2
...
2019-10-03 23:40:52
222.186.180.8 attackspam
Oct  3 20:24:27 areeb-Workstation sshd[14797]: Failed password for root from 222.186.180.8 port 8858 ssh2
Oct  3 20:24:31 areeb-Workstation sshd[14797]: Failed password for root from 222.186.180.8 port 8858 ssh2
...
2019-10-03 23:30:39
92.63.194.26 attackbotsspam
Oct  3 17:37:49 cvbnet sshd[7733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26 
Oct  3 17:37:52 cvbnet sshd[7733]: Failed password for invalid user admin from 92.63.194.26 port 41804 ssh2
...
2019-10-03 23:52:57
179.215.143.22 attackspambots
proto=tcp  .  spt=39671  .  dpt=25  .     (Found on   Dark List de Oct 03)     (450)
2019-10-03 23:36:06
101.36.150.59 attackbots
Oct  3 11:19:53 xtremcommunity sshd\[143675\]: Invalid user nagios from 101.36.150.59 port 50350
Oct  3 11:19:53 xtremcommunity sshd\[143675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.150.59
Oct  3 11:19:55 xtremcommunity sshd\[143675\]: Failed password for invalid user nagios from 101.36.150.59 port 50350 ssh2
Oct  3 11:26:08 xtremcommunity sshd\[143840\]: Invalid user vnc from 101.36.150.59 port 59906
Oct  3 11:26:08 xtremcommunity sshd\[143840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.36.150.59
...
2019-10-03 23:31:02
222.186.173.201 attackspambots
Oct  3 11:30:22 plusreed sshd[13460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
Oct  3 11:30:24 plusreed sshd[13460]: Failed password for root from 222.186.173.201 port 28214 ssh2
Oct  3 11:30:42 plusreed sshd[13460]: Failed password for root from 222.186.173.201 port 28214 ssh2
Oct  3 11:30:22 plusreed sshd[13460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
Oct  3 11:30:24 plusreed sshd[13460]: Failed password for root from 222.186.173.201 port 28214 ssh2
Oct  3 11:30:42 plusreed sshd[13460]: Failed password for root from 222.186.173.201 port 28214 ssh2
Oct  3 11:30:22 plusreed sshd[13460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
Oct  3 11:30:24 plusreed sshd[13460]: Failed password for root from 222.186.173.201 port 28214 ssh2
Oct  3 11:30:42 plusreed sshd[13460]: Failed password for root fr
2019-10-03 23:36:20
117.239.69.117 attackspambots
ssh failed login
2019-10-04 00:00:10
107.6.113.180 attack
ICMP MP Probe, Scan -
2019-10-03 23:37:20
106.39.186.251 attackspam
ICMP MP Probe, Scan -
2019-10-03 23:55:45
170.0.125.41 attackspambots
[Aegis] @ 2019-10-03 13:25:56  0100 -> Multiple attempts to send e-mail from invalid/unknown sender domain.
2019-10-04 00:16:08
202.137.20.58 attack
Oct  3 14:25:59 vmd17057 sshd\[4065\]: Invalid user test from 202.137.20.58 port 35763
Oct  3 14:25:59 vmd17057 sshd\[4065\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.137.20.58
Oct  3 14:26:01 vmd17057 sshd\[4065\]: Failed password for invalid user test from 202.137.20.58 port 35763 ssh2
...
2019-10-04 00:15:35
139.199.193.202 attack
Oct  3 05:40:49 kapalua sshd\[16944\]: Invalid user admin from 139.199.193.202
Oct  3 05:40:49 kapalua sshd\[16944\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.193.202
Oct  3 05:40:51 kapalua sshd\[16944\]: Failed password for invalid user admin from 139.199.193.202 port 46874 ssh2
Oct  3 05:46:53 kapalua sshd\[17527\]: Invalid user carolina from 139.199.193.202
Oct  3 05:46:53 kapalua sshd\[17527\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.193.202
2019-10-03 23:54:48

Recently Reported IPs

45.100.2.94 6.137.222.112 41.160.18.70 193.100.24.223
125.26.139.159 223.151.211.206 131.82.249.114 162.70.157.224
241.114.111.65 49.152.202.119 172.57.42.102 235.61.208.179
26.137.215.144 180.21.144.102 233.253.173.221 247.252.230.50
169.150.85.179 152.19.16.167 178.171.103.255 237.226.44.94