Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.47.194.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.47.194.123.			IN	A

;; AUTHORITY SECTION:
.			196	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060501 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 06 13:13:31 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 123.194.47.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 123.194.47.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.70.13.4 attackspambots
WordPress user registration, really-simple-captcha js check bypass
2020-05-20 04:02:08
62.210.177.42 attackbots
Blocked WP login attempts / xmlrpc attack
2020-05-20 04:04:58
114.67.242.135 attackbots
May 19 21:48:07 pve1 sshd[12045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.242.135 
May 19 21:48:09 pve1 sshd[12045]: Failed password for invalid user kzr from 114.67.242.135 port 47375 ssh2
...
2020-05-20 04:34:44
36.225.214.60 attackspambots
RDP Bruteforce
2020-05-20 04:09:25
218.255.86.106 attackbotsspam
2020-05-19T18:55:55.308942abusebot-3.cloudsearch.cf sshd[29562]: Invalid user szw from 218.255.86.106 port 35679
2020-05-19T18:55:55.315319abusebot-3.cloudsearch.cf sshd[29562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.255.86.106
2020-05-19T18:55:55.308942abusebot-3.cloudsearch.cf sshd[29562]: Invalid user szw from 218.255.86.106 port 35679
2020-05-19T18:55:57.363809abusebot-3.cloudsearch.cf sshd[29562]: Failed password for invalid user szw from 218.255.86.106 port 35679 ssh2
2020-05-19T18:57:31.573092abusebot-3.cloudsearch.cf sshd[29644]: Invalid user nmr from 218.255.86.106 port 46432
2020-05-19T18:57:31.579380abusebot-3.cloudsearch.cf sshd[29644]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.255.86.106
2020-05-19T18:57:31.573092abusebot-3.cloudsearch.cf sshd[29644]: Invalid user nmr from 218.255.86.106 port 46432
2020-05-19T18:57:33.141128abusebot-3.cloudsearch.cf sshd[29644]: Failed pa
...
2020-05-20 04:14:19
137.74.246.160 attack
spam 19 May 2020 10:01 Received: from pablo.finkarts.com ([137.74.246.160]) Return-Path: 
2020-05-20 04:10:38
106.12.122.138 attackspambots
Invalid user ctt from 106.12.122.138 port 59924
2020-05-20 04:05:16
54.76.247.239 attack
spam from starofservice.com
2020-05-20 04:23:36
157.230.125.122 attack
60/tcp 19947/tcp 24982/tcp...
[2020-04-12/05-18]76pkt,28pt.(tcp)
2020-05-20 04:25:16
35.223.136.224 attackbots
SSH/22 MH Probe, BF, Hack -
2020-05-20 04:11:05
162.243.145.89 attackbotsspam
Port scan denied
2020-05-20 04:22:20
189.203.142.73 attackspam
...
2020-05-20 04:20:36
216.188.133.10 attackbotsspam
Probing for files and paths: /OLD/
2020-05-20 03:55:36
185.234.217.12 attack
Tried hack Mikrotik router
2020-05-20 03:55:50
106.13.81.162 attack
Automatic report - Banned IP Access
2020-05-20 04:34:19

Recently Reported IPs

204.172.230.119 131.172.209.141 82.170.198.235 118.20.234.42
60.197.199.28 44.44.200.15 138.5.27.186 113.219.14.193
237.112.114.51 215.123.123.116 220.231.254.55 155.171.13.177
238.93.85.40 227.218.170.100 63.122.164.213 209.104.87.196
112.59.94.252 243.204.88.67 113.155.246.92 25.115.30.196