Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.55.247.25
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.55.247.25.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:51:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 25.247.55.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 25.247.55.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.78.46.81 attackbotsspam
Dec  2 17:06:00 ny01 sshd[660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81
Dec  2 17:06:02 ny01 sshd[660]: Failed password for invalid user langeland from 218.78.46.81 port 59259 ssh2
Dec  2 17:12:28 ny01 sshd[1772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81
2019-12-03 06:30:41
106.13.181.68 attackspam
Dec  2 23:20:33 mail sshd[18481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.68 
Dec  2 23:20:35 mail sshd[18481]: Failed password for invalid user oracle from 106.13.181.68 port 58108 ssh2
Dec  2 23:28:23 mail sshd[20361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.181.68
2019-12-03 06:39:28
222.186.173.226 attack
Dec  2 23:15:35 tux-35-217 sshd\[8097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
Dec  2 23:15:37 tux-35-217 sshd\[8097\]: Failed password for root from 222.186.173.226 port 21704 ssh2
Dec  2 23:15:39 tux-35-217 sshd\[8097\]: Failed password for root from 222.186.173.226 port 21704 ssh2
Dec  2 23:15:42 tux-35-217 sshd\[8097\]: Failed password for root from 222.186.173.226 port 21704 ssh2
...
2019-12-03 06:27:36
157.230.91.45 attackspam
Dec  2 11:45:32 tdfoods sshd\[15246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45  user=root
Dec  2 11:45:34 tdfoods sshd\[15246\]: Failed password for root from 157.230.91.45 port 34521 ssh2
Dec  2 11:50:49 tdfoods sshd\[15786\]: Invalid user simon from 157.230.91.45
Dec  2 11:50:49 tdfoods sshd\[15786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45
Dec  2 11:50:51 tdfoods sshd\[15786\]: Failed password for invalid user simon from 157.230.91.45 port 40431 ssh2
2019-12-03 06:05:00
104.248.154.12 attackbotsspam
Dec  2 11:48:55 hpm sshd\[20194\]: Invalid user raquela from 104.248.154.12
Dec  2 11:48:55 hpm sshd\[20194\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.154.12
Dec  2 11:48:56 hpm sshd\[20194\]: Failed password for invalid user raquela from 104.248.154.12 port 37920 ssh2
Dec  2 11:55:59 hpm sshd\[20903\]: Invalid user tour from 104.248.154.12
Dec  2 11:55:59 hpm sshd\[20903\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.154.12
2019-12-03 06:11:15
114.84.174.146 attackspam
2019-12-02 22:35:09,208 fail2ban.actions: WARNING [ssh] Ban 114.84.174.146
2019-12-03 06:13:09
128.199.216.250 attack
Dec  2 23:05:15 mail sshd[14300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.216.250 
Dec  2 23:05:17 mail sshd[14300]: Failed password for invalid user servers from 128.199.216.250 port 44916 ssh2
Dec  2 23:13:56 mail sshd[16711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.216.250
2019-12-03 06:38:48
27.105.103.3 attackbotsspam
Dec  2 22:35:15 lnxded63 sshd[28044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.105.103.3
Dec  2 22:35:15 lnxded63 sshd[28044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.105.103.3
2019-12-03 06:04:05
50.207.12.103 attackspam
Dec  2 12:01:38 hanapaa sshd\[21565\]: Invalid user slager from 50.207.12.103
Dec  2 12:01:38 hanapaa sshd\[21565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50-207-12-103-static.hfc.comcastbusiness.net
Dec  2 12:01:39 hanapaa sshd\[21565\]: Failed password for invalid user slager from 50.207.12.103 port 49352 ssh2
Dec  2 12:07:03 hanapaa sshd\[22094\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50-207-12-103-static.hfc.comcastbusiness.net  user=root
Dec  2 12:07:05 hanapaa sshd\[22094\]: Failed password for root from 50.207.12.103 port 60640 ssh2
2019-12-03 06:21:44
222.186.175.216 attack
Dec  3 00:20:36 sauna sshd[208637]: Failed password for root from 222.186.175.216 port 27070 ssh2
Dec  3 00:20:48 sauna sshd[208637]: Failed password for root from 222.186.175.216 port 27070 ssh2
Dec  3 00:20:48 sauna sshd[208637]: error: maximum authentication attempts exceeded for root from 222.186.175.216 port 27070 ssh2 [preauth]
...
2019-12-03 06:26:54
51.38.134.34 attackbots
Dec  2 23:21:18 vtv3 sshd[22049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.134.34 
Dec  2 23:21:20 vtv3 sshd[22049]: Failed password for invalid user ching from 51.38.134.34 port 55760 ssh2
Dec  2 23:29:17 vtv3 sshd[25369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.134.34 
Dec  2 23:40:03 vtv3 sshd[30533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.134.34 
Dec  2 23:40:04 vtv3 sshd[30533]: Failed password for invalid user chrisg from 51.38.134.34 port 34764 ssh2
Dec  2 23:45:37 vtv3 sshd[1217]: Failed password for root from 51.38.134.34 port 46582 ssh2
Dec  2 23:56:27 vtv3 sshd[6071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.134.34 
Dec  2 23:56:30 vtv3 sshd[6071]: Failed password for invalid user test from 51.38.134.34 port 41978 ssh2
Dec  3 00:01:58 vtv3 sshd[8551]: pam_unix(sshd:auth): authentication
2019-12-03 06:17:11
91.207.40.45 attackbots
2019-12-02T22:06:29.212684shield sshd\[12420\]: Invalid user sales2 from 91.207.40.45 port 39234
2019-12-02T22:06:29.218203shield sshd\[12420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.netcom-e.ru
2019-12-02T22:06:31.597000shield sshd\[12420\]: Failed password for invalid user sales2 from 91.207.40.45 port 39234 ssh2
2019-12-02T22:12:32.011174shield sshd\[14470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.netcom-e.ru  user=root
2019-12-02T22:12:34.414391shield sshd\[14470\]: Failed password for root from 91.207.40.45 port 50952 ssh2
2019-12-03 06:14:52
181.114.29.86 attack
(sasl) 65, Failed SASL login from 181.114.29.86 (GT/Guatemala/Departamento de Guatemala/Guatemala City/-/[AS52286 Columbus Networks Guatemala]): 1 in the last 3600 secs
2019-12-03 06:25:42
120.131.3.91 attack
Dec  2 23:14:49 jane sshd[4616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.3.91 
Dec  2 23:14:52 jane sshd[4616]: Failed password for invalid user larry from 120.131.3.91 port 37446 ssh2
...
2019-12-03 06:22:07
117.202.8.55 attackspambots
Dec  2 22:41:52 vps647732 sshd[6666]: Failed password for root from 117.202.8.55 port 55673 ssh2
...
2019-12-03 06:33:10

Recently Reported IPs

226.167.51.149 67.217.242.224 82.189.12.166 36.209.146.221
151.205.249.250 9.139.120.102 250.229.253.157 247.44.229.204
178.34.193.82 167.103.119.86 75.212.184.46 129.221.66.114
127.34.195.66 88.2.179.161 167.78.247.78 206.43.88.61
85.172.229.180 12.109.44.157 199.148.114.11 216.0.166.53