Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.59.66.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18561
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.59.66.44.			IN	A

;; AUTHORITY SECTION:
.			505	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122902 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 30 12:46:49 CST 2021
;; MSG SIZE  rcvd: 105
Host info
Host 44.66.59.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.66.59.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.39.186.22 attackbotsspam
Honeypot attack, port: 81, PTR: 93-39-186-22.ip77.fastwebnet.it.
2020-03-09 17:53:44
1.55.86.153 attackbots
Unauthorized connection attempt from IP address 1.55.86.153 on Port 445(SMB)
2020-03-09 17:55:16
51.38.238.87 attackbots
Mar  9 07:50:53 mail sshd[7333]: Invalid user x-bot from 51.38.238.87
Mar  9 07:50:53 mail sshd[7333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.238.87
Mar  9 07:50:53 mail sshd[7333]: Invalid user x-bot from 51.38.238.87
Mar  9 07:50:55 mail sshd[7333]: Failed password for invalid user x-bot from 51.38.238.87 port 44532 ssh2
...
2020-03-09 17:31:01
103.44.3.207 attack
Unauthorised access (Mar  9) SRC=103.44.3.207 LEN=40 TTL=246 ID=65181 DF TCP DPT=23 WINDOW=14600 SYN
2020-03-09 17:43:30
179.57.254.69 attackbots
1583736613 - 03/09/2020 07:50:13 Host: 179.57.254.69/179.57.254.69 Port: 445 TCP Blocked
2020-03-09 17:37:52
114.27.192.18 attack
Unauthorized connection attempt from IP address 114.27.192.18 on Port 445(SMB)
2020-03-09 17:39:15
196.41.127.68 attackspambots
Mar  9 05:53:42 m3061 sshd[19242]: Invalid user yoshida from 196.41.127.68
Mar  9 05:53:45 m3061 sshd[19242]: Failed password for invalid user yoshida from 196.41.127.68 port 53064 ssh2
Mar  9 05:53:45 m3061 sshd[19242]: Received disconnect from 196.41.127.68: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=196.41.127.68
2020-03-09 17:35:53
134.236.2.11 attackspambots
Unauthorized connection attempt from IP address 134.236.2.11 on Port 445(SMB)
2020-03-09 17:55:50
118.69.35.129 attackspam
Unauthorized connection attempt from IP address 118.69.35.129 on Port 445(SMB)
2020-03-09 17:36:21
31.208.199.39 attack
Honeypot attack, port: 5555, PTR: 31-208-199-39.cust.bredband2.com.
2020-03-09 17:58:41
61.165.36.240 attack
Unauthorized connection attempt from IP address 61.165.36.240 on Port 445(SMB)
2020-03-09 17:59:11
222.186.173.142 attackbotsspam
Mar  8 23:19:45 web1 sshd\[9774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
Mar  8 23:19:47 web1 sshd\[9774\]: Failed password for root from 222.186.173.142 port 5844 ssh2
Mar  8 23:19:50 web1 sshd\[9774\]: Failed password for root from 222.186.173.142 port 5844 ssh2
Mar  8 23:19:54 web1 sshd\[9774\]: Failed password for root from 222.186.173.142 port 5844 ssh2
Mar  8 23:20:04 web1 sshd\[9824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.142  user=root
2020-03-09 17:31:35
5.43.148.105 attackbots
Honeypot attack, port: 445, PTR: 5-43-148-105.k-telecom.org.
2020-03-09 17:42:52
182.53.147.97 attack
1583729084 - 03/09/2020 05:44:44 Host: 182.53.147.97/182.53.147.97 Port: 445 TCP Blocked
2020-03-09 17:30:41
182.253.72.6 attackbots
Unauthorized connection attempt from IP address 182.253.72.6 on Port 445(SMB)
2020-03-09 17:40:21

Recently Reported IPs

195.98.71.51 43.132.77.160 189.71.179.156 65.211.187.233
118.193.163.80 85.9.243.198 13.194.13.121 66.137.16.8
210.99.188.178 175.31.147.128 227.58.77.237 153.234.105.166
20.0.132.130 50.171.229.114 85.208.210.202 191.37.5.190
129.43.248.117 39.79.207.62 198.42.67.131 140.166.134.129