Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.6.97.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.6.97.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 20:53:19 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 136.97.6.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.97.6.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.77.105.210 attackspambots
firewall-block, port(s): 80/tcp
2020-03-27 16:20:47
202.131.152.2 attackspam
2020-03-27T08:47:30.731274shield sshd\[1456\]: Invalid user iuo from 202.131.152.2 port 60140
2020-03-27T08:47:30.740373shield sshd\[1456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.152.2
2020-03-27T08:47:32.215905shield sshd\[1456\]: Failed password for invalid user iuo from 202.131.152.2 port 60140 ssh2
2020-03-27T08:51:47.409115shield sshd\[2501\]: Invalid user xbo from 202.131.152.2 port 39136
2020-03-27T08:51:47.418761shield sshd\[2501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.131.152.2
2020-03-27 17:02:55
45.133.99.4 attack
Mar 27 09:26:00 srv01 postfix/smtpd\[2894\]: warning: unknown\[45.133.99.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 27 09:26:17 srv01 postfix/smtpd\[2925\]: warning: unknown\[45.133.99.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 27 09:29:13 srv01 postfix/smtpd\[2883\]: warning: unknown\[45.133.99.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 27 09:29:33 srv01 postfix/smtpd\[2925\]: warning: unknown\[45.133.99.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 27 09:30:49 srv01 postfix/smtpd\[2883\]: warning: unknown\[45.133.99.4\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-03-27 16:41:48
103.129.223.22 attackbots
SSH brute-force: detected 7 distinct usernames within a 24-hour window.
2020-03-27 17:00:29
51.178.53.194 attackspambots
Invalid user constanza from 51.178.53.194 port 41394
2020-03-27 16:41:19
175.197.74.237 attack
Invalid user chinaken from 175.197.74.237 port 8237
2020-03-27 16:47:56
1.194.239.202 attackspam
Invalid user lv from 1.194.239.202 port 38296
2020-03-27 16:31:51
175.5.65.168 attackspambots
[portscan] Port scan
2020-03-27 16:33:02
202.102.79.232 attackspam
SSH Brute Force
2020-03-27 16:26:23
178.62.186.49 attack
Invalid user vh from 178.62.186.49 port 35446
2020-03-27 16:51:32
223.113.74.54 attackbots
DATE:2020-03-27 06:17:48, IP:223.113.74.54, PORT:ssh SSH brute force auth (docker-dc)
2020-03-27 16:40:20
218.92.0.208 attackspam
Unauthorized connection attempt detected from IP address 218.92.0.208 to port 22 [T]
2020-03-27 17:03:25
109.190.77.152 attackspam
Invalid user zh from 109.190.77.152 port 56110
2020-03-27 16:57:00
117.184.114.140 attackspam
Mar 27 07:30:08 ws26vmsma01 sshd[69385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.184.114.140
Mar 27 07:30:10 ws26vmsma01 sshd[69385]: Failed password for invalid user ie from 117.184.114.140 port 47118 ssh2
...
2020-03-27 16:22:11
159.203.82.104 attackbots
Invalid user tecnici from 159.203.82.104 port 53178
2020-03-27 16:34:07

Recently Reported IPs

101.207.156.150 130.229.203.61 32.160.233.136 173.140.17.4
30.20.149.71 88.79.69.16 20.81.243.152 27.96.217.166
224.63.47.35 51.82.191.221 144.25.241.100 97.40.40.242
152.148.152.33 109.167.171.221 65.180.123.159 199.182.33.114
202.192.11.222 150.104.3.95 84.8.25.201 31.58.234.164