Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.45.121.181
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64696
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.45.121.181.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 30 05:58:50 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 181.121.45.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 181.121.45.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.204.153.34 attackspambots
none
2019-11-27 18:37:21
148.70.24.20 attackbotsspam
Nov 27 05:20:02 linuxvps sshd\[53749\]: Invalid user server from 148.70.24.20
Nov 27 05:20:02 linuxvps sshd\[53749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.24.20
Nov 27 05:20:05 linuxvps sshd\[53749\]: Failed password for invalid user server from 148.70.24.20 port 41242 ssh2
Nov 27 05:27:52 linuxvps sshd\[58219\]: Invalid user solanki from 148.70.24.20
Nov 27 05:27:52 linuxvps sshd\[58219\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.24.20
2019-11-27 18:50:10
5.39.87.36 attack
WordPress login Brute force / Web App Attack on client site.
2019-11-27 18:44:32
198.27.74.64 attackspambots
198.27.74.64 - - [27/Nov/2019:07:24:53 +0100] "POST /wp-login.php HTTP/1.1" 200 3123 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.27.74.64 - - [27/Nov/2019:07:24:54 +0100] "POST /wp-login.php HTTP/1.1" 200 3102 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-27 18:56:33
219.128.130.102 attackbots
Port scan on 1 port(s): 53
2019-11-27 18:27:04
178.62.79.227 attackbots
Nov 26 23:56:44 web1 sshd\[8264\]: Invalid user admin777 from 178.62.79.227
Nov 26 23:56:44 web1 sshd\[8264\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.79.227
Nov 26 23:56:47 web1 sshd\[8264\]: Failed password for invalid user admin777 from 178.62.79.227 port 60050 ssh2
Nov 27 00:01:56 web1 sshd\[8748\]: Invalid user bot from 178.62.79.227
Nov 27 00:01:56 web1 sshd\[8748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.62.79.227
2019-11-27 19:00:58
124.235.206.130 attackbotsspam
Nov 27 09:29:30 pornomens sshd\[20234\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.235.206.130  user=root
Nov 27 09:29:32 pornomens sshd\[20234\]: Failed password for root from 124.235.206.130 port 59608 ssh2
Nov 27 09:36:21 pornomens sshd\[20290\]: Invalid user guest from 124.235.206.130 port 61729
Nov 27 09:36:21 pornomens sshd\[20290\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.235.206.130
...
2019-11-27 18:42:46
5.249.154.119 attackbotsspam
Nov 27 10:12:57 hosting sshd[30428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.249.154.119  user=root
Nov 27 10:12:59 hosting sshd[30428]: Failed password for root from 5.249.154.119 port 57370 ssh2
...
2019-11-27 18:49:38
103.43.76.181 attack
SASL Brute Force
2019-11-27 18:34:40
68.183.178.162 attack
Nov 27 11:24:48 gw1 sshd[12018]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162
Nov 27 11:24:50 gw1 sshd[12018]: Failed password for invalid user cherida from 68.183.178.162 port 47618 ssh2
...
2019-11-27 18:58:20
189.213.21.140 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-27 18:23:15
51.77.141.158 attack
Nov 27 08:22:51 server sshd\[12583\]: Invalid user on from 51.77.141.158 port 36325
Nov 27 08:22:51 server sshd\[12583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.141.158
Nov 27 08:22:52 server sshd\[12583\]: Failed password for invalid user on from 51.77.141.158 port 36325 ssh2
Nov 27 08:26:00 server sshd\[19030\]: User root from 51.77.141.158 not allowed because listed in DenyUsers
Nov 27 08:26:00 server sshd\[19030\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.141.158  user=root
2019-11-27 18:22:25
175.212.62.83 attackbotsspam
Repeated brute force against a port
2019-11-27 18:30:16
201.149.20.162 attack
Nov 27 09:41:16 MK-Soft-VM4 sshd[15005]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.149.20.162 
Nov 27 09:41:19 MK-Soft-VM4 sshd[15005]: Failed password for invalid user test1235 from 201.149.20.162 port 18566 ssh2
...
2019-11-27 18:49:05
13.234.177.166 attackbots
Brute force attack against VPN service
2019-11-27 18:52:40

Recently Reported IPs

197.121.245.37 38.82.124.245 78.153.140.151 147.185.132.181
186.254.90.21 96.203.73.124 234.10.233.223 188.176.187.162
219.23.248.111 184.40.146.223 232.114.197.160 115.1.224.68
144.204.106.75 242.1.11.6 28.110.208.90 235.49.236.198
132.235.63.39 107.160.87.79 145.131.51.86 87.20.66.188