Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.56.105.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3750
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.56.105.3.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 12:50:24 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 3.105.56.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.105.56.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
202.147.198.154 attackbots
Invalid user mint from 202.147.198.154 port 40810
2020-05-14 15:32:02
150.109.34.190 attackbots
invalid login attempt (master)
2020-05-14 15:04:21
106.58.220.87 attack
(pop3d) Failed POP3 login from 106.58.220.87 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 14 11:03:02 ir1 dovecot[264309]: pop3-login: Aborted login (auth failed, 1 attempts in 6 secs): user=, method=PLAIN, rip=106.58.220.87, lip=5.63.12.44, session=
2020-05-14 15:05:02
171.242.50.27 attackspam
May 14 03:51:14 sshgateway sshd\[28594\]: Invalid user admin2 from 171.242.50.27
May 14 03:51:15 sshgateway sshd\[28594\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.242.50.27
May 14 03:51:16 sshgateway sshd\[28594\]: Failed password for invalid user admin2 from 171.242.50.27 port 59514 ssh2
2020-05-14 15:00:31
165.22.50.55 attack
Invalid user hack from 165.22.50.55 port 60048
2020-05-14 14:49:10
85.185.161.202 attackspambots
Invalid user ubuntu from 85.185.161.202 port 37416
2020-05-14 15:32:47
180.183.142.98 attackspam
May 14 05:50:58 nginx sshd[91130]: Invalid user 666666 from 180.183.142.98
May 14 05:50:58 nginx sshd[91130]: Connection closed by 180.183.142.98 port 30875 [preauth]
2020-05-14 15:17:11
51.136.60.55 attack
Failed password for invalid user mc from 51.136.60.55 port 44852 ssh2
2020-05-14 14:47:59
150.109.104.153 attackspambots
"Unauthorized connection attempt on SSHD detected"
2020-05-14 14:57:27
117.210.210.208 attackspam
Email SMTP authentication failure
2020-05-14 15:36:52
122.15.209.37 attackspambots
Invalid user facai from 122.15.209.37 port 59724
2020-05-14 14:49:26
89.36.220.145 attackspambots
May 14 07:49:57 * sshd[19731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.36.220.145
May 14 07:49:59 * sshd[19731]: Failed password for invalid user grace from 89.36.220.145 port 59017 ssh2
2020-05-14 14:53:36
146.88.240.4 attack
05/14/2020-02:52:01.473427 146.88.240.4 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-05-14 14:57:42
164.132.57.16 attack
May 14 08:24:15 nextcloud sshd\[31312\]: Invalid user dcnpro from 164.132.57.16
May 14 08:24:15 nextcloud sshd\[31312\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.57.16
May 14 08:24:17 nextcloud sshd\[31312\]: Failed password for invalid user dcnpro from 164.132.57.16 port 52958 ssh2
2020-05-14 15:02:08
24.220.127.87 attackspam
Brute forcing email accounts
2020-05-14 15:12:52

Recently Reported IPs

143.248.43.232 22.225.4.69 155.55.22.244 170.67.192.205
206.240.191.128 210.186.66.74 221.67.178.205 77.233.183.2
221.121.125.89 123.230.186.85 95.220.161.39 55.173.57.68
57.35.87.212 83.159.75.46 179.140.1.143 6.18.149.90
96.211.65.60 68.13.242.230 196.138.172.181 149.120.75.166