Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.65.107.0
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15265
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.65.107.0.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 15:01:00 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 0.107.65.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 0.107.65.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
190.95.42.26 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 05-11-2019 14:30:26.
2019-11-06 06:20:34
27.72.29.131 attackspam
Unauthorized connection attempt from IP address 27.72.29.131 on Port 445(SMB)
2019-11-06 06:04:49
147.135.211.127 attackspam
Unauthorized SSH login attempts
2019-11-06 05:58:33
173.212.252.245 attack
Input Traffic from this IP, but critial abuseconfidencescore
2019-11-06 06:09:06
202.67.37.42 attack
Unauthorized connection attempt from IP address 202.67.37.42 on Port 445(SMB)
2019-11-06 06:27:33
94.125.239.251 attackbotsspam
Unauthorized connection attempt from IP address 94.125.239.251 on Port 445(SMB)
2019-11-06 06:31:17
207.46.13.58 attackspam
WEB_SERVER 403 Forbidden
2019-11-06 06:08:46
107.175.38.115 attackbotsspam
port scan/probe/communication attempt
2019-11-06 06:01:43
193.29.13.20 attackbots
193.29.13.20 was recorded 5 times by 4 hosts attempting to connect to the following ports: 5656,5757,5454. Incident counter (4h, 24h, all-time): 5, 24, 80
2019-11-06 06:27:50
36.65.86.2 attackspambots
Unauthorized connection attempt from IP address 36.65.86.2 on Port 445(SMB)
2019-11-06 06:10:08
31.173.103.71 attackbotsspam
Unauthorized connection attempt from IP address 31.173.103.71 on Port 445(SMB)
2019-11-06 06:28:46
167.114.208.184 attackspam
Automatic report - XMLRPC Attack
2019-11-06 06:26:27
188.163.50.119 attack
Unauthorized connection attempt from IP address 188.163.50.119 on Port 445(SMB)
2019-11-06 06:11:41
195.154.82.61 attackspambots
Nov  5 05:39:47 sachi sshd\[30692\]: Invalid user ubnt from 195.154.82.61
Nov  5 05:39:47 sachi sshd\[30692\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-82-61.rev.poneytelecom.eu
Nov  5 05:39:50 sachi sshd\[30692\]: Failed password for invalid user ubnt from 195.154.82.61 port 36652 ssh2
Nov  5 05:43:23 sachi sshd\[30978\]: Invalid user cz from 195.154.82.61
Nov  5 05:43:23 sachi sshd\[30978\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195-154-82-61.rev.poneytelecom.eu
2019-11-06 06:15:21
46.107.122.35 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 05-11-2019 14:30:29.
2019-11-06 06:17:30

Recently Reported IPs

194.243.144.70 59.240.239.91 161.249.158.56 98.27.156.82
3.169.72.189 176.12.228.189 178.189.254.54 219.135.250.136
36.22.81.192 180.62.53.61 214.99.177.255 98.230.255.193
24.243.239.155 207.41.81.180 88.109.181.60 232.207.22.242
178.50.44.251 46.68.73.212 190.197.203.70 129.47.236.177