Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.52.108.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42015
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.52.108.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012700 1800 900 604800 86400

;; Query time: 153 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 27 16:42:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 99.108.52.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.108.52.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.98.96.184 attackspam
Jul 15 05:19:41 meumeu sshd[13652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.96.184 
Jul 15 05:19:43 meumeu sshd[13652]: Failed password for invalid user 19 from 118.98.96.184 port 45397 ssh2
Jul 15 05:25:33 meumeu sshd[14729]: Failed password for jabber from 118.98.96.184 port 43800 ssh2
...
2019-07-15 11:35:10
185.114.247.108 attack
[portscan] Port scan
2019-07-15 11:33:46
58.175.144.110 attackbots
Jul 15 01:47:32 MK-Soft-VM3 sshd\[17836\]: Invalid user trinity from 58.175.144.110 port 33956
Jul 15 01:47:32 MK-Soft-VM3 sshd\[17836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.175.144.110
Jul 15 01:47:34 MK-Soft-VM3 sshd\[17836\]: Failed password for invalid user trinity from 58.175.144.110 port 33956 ssh2
...
2019-07-15 11:24:54
187.44.113.33 attack
Jul 14 23:08:40 tuxlinux sshd[16330]: Invalid user desktop from 187.44.113.33 port 45287
Jul 14 23:08:40 tuxlinux sshd[16330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.44.113.33 
Jul 14 23:08:40 tuxlinux sshd[16330]: Invalid user desktop from 187.44.113.33 port 45287
Jul 14 23:08:40 tuxlinux sshd[16330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.44.113.33 
Jul 14 23:08:40 tuxlinux sshd[16330]: Invalid user desktop from 187.44.113.33 port 45287
Jul 14 23:08:40 tuxlinux sshd[16330]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.44.113.33 
Jul 14 23:08:42 tuxlinux sshd[16330]: Failed password for invalid user desktop from 187.44.113.33 port 45287 ssh2
...
2019-07-15 11:38:40
60.243.84.226 attack
Automatic report - Port Scan Attack
2019-07-15 11:23:58
222.84.169.59 attackbots
2019-07-14 16:38:26 dovecot_login authenticator failed for (gjaqf.com) [222.84.169.59]:49564 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
2019-07-14 16:39:22 dovecot_login authenticator failed for (gjaqf.com) [222.84.169.59]:51172 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
2019-07-14 16:40:01 dovecot_login authenticator failed for (gjaqf.com) [222.84.169.59]:54695 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=ler@lerctr.org)
...
2019-07-15 11:30:39
142.44.211.229 attack
Jul 15 02:56:50 animalibera sshd[15332]: Invalid user mysql from 142.44.211.229 port 34954
...
2019-07-15 11:06:34
61.219.171.213 attackbots
Jul 15 03:14:27 MK-Soft-VM7 sshd\[3577\]: Invalid user ronald from 61.219.171.213 port 35447
Jul 15 03:14:27 MK-Soft-VM7 sshd\[3577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.219.171.213
Jul 15 03:14:28 MK-Soft-VM7 sshd\[3577\]: Failed password for invalid user ronald from 61.219.171.213 port 35447 ssh2
...
2019-07-15 11:27:54
104.236.78.228 attackspam
Jul 15 05:12:47 h2177944 sshd\[6232\]: Invalid user dylan from 104.236.78.228 port 45929
Jul 15 05:12:47 h2177944 sshd\[6232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.78.228
Jul 15 05:12:49 h2177944 sshd\[6232\]: Failed password for invalid user dylan from 104.236.78.228 port 45929 ssh2
Jul 15 05:19:24 h2177944 sshd\[6433\]: Invalid user victor from 104.236.78.228 port 44796
...
2019-07-15 11:43:37
51.75.36.33 attackspam
Jul 15 04:58:02 SilenceServices sshd[27702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.36.33
Jul 15 04:58:04 SilenceServices sshd[27702]: Failed password for invalid user mike from 51.75.36.33 port 40482 ssh2
Jul 15 05:02:50 SilenceServices sshd[30728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.36.33
2019-07-15 11:04:46
41.72.197.34 attackspam
Jul 15 01:12:55 ns37 sshd[7049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.72.197.34
2019-07-15 11:11:48
47.95.224.246 attack
Automatic report - Banned IP Access
2019-07-15 11:09:29
104.194.11.156 attackspam
15.07.2019 03:36:10 SSH access blocked by firewall
2019-07-15 11:41:19
118.97.188.105 attackbotsspam
2019-07-15T03:04:49.288552abusebot.cloudsearch.cf sshd\[11888\]: Invalid user user1 from 118.97.188.105 port 43374
2019-07-15 11:33:21
79.107.96.0 attackbotsspam
Automatic report - Port Scan Attack
2019-07-15 11:14:34

Recently Reported IPs

7.130.61.15 118.213.35.24 63.245.47.100 137.148.11.222
221.150.184.32 115.171.31.231 90.101.169.119 56.52.81.152
130.159.246.229 21.242.193.10 124.252.76.185 169.50.242.231
248.49.249.249 134.222.249.122 137.41.103.255 116.234.149.43
229.232.247.91 134.58.222.177 18.45.68.149 17.144.208.196