Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.7.12.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2144
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.7.12.2.			IN	A

;; AUTHORITY SECTION:
.			348	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 10:47:43 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 2.12.7.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 2.12.7.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
129.150.71.191 attack
Jul 30 05:28:23 herz-der-gamer sshd[2302]: Failed password for invalid user cesar from 129.150.71.191 port 27815 ssh2
...
2019-07-30 16:57:23
112.186.77.90 attack
Jul 30 04:20:08 mout sshd[7057]: Invalid user kody from 112.186.77.90 port 51712
2019-07-30 17:14:13
221.156.116.51 attack
Jul 30 10:46:12 mout sshd[16802]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.156.116.51
Jul 30 10:46:12 mout sshd[16802]: Invalid user vi from 221.156.116.51 port 48310
Jul 30 10:46:14 mout sshd[16802]: Failed password for invalid user vi from 221.156.116.51 port 48310 ssh2
2019-07-30 16:56:08
139.199.35.66 attack
Jul 30 08:35:19 mail sshd\[23114\]: Invalid user mpws from 139.199.35.66 port 57922
Jul 30 08:35:19 mail sshd\[23114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.35.66
...
2019-07-30 16:54:49
86.122.123.56 attack
23/tcp 5555/tcp...
[2019-06-28/07-29]4pkt,2pt.(tcp)
2019-07-30 17:21:39
148.70.223.29 attackspambots
2019-07-27 20:34:12,888 fail2ban.actions        [753]: NOTICE  [sshd] Ban 148.70.223.29
2019-07-27 23:47:22,472 fail2ban.actions        [753]: NOTICE  [sshd] Ban 148.70.223.29
2019-07-28 03:05:05,784 fail2ban.actions        [753]: NOTICE  [sshd] Ban 148.70.223.29
...
2019-07-30 17:38:48
185.9.84.182 attackbotsspam
email spam
2019-07-30 17:18:54
49.234.3.197 attack
Jul 30 04:19:45 amit sshd\[28554\]: Invalid user ellen from 49.234.3.197
Jul 30 04:19:45 amit sshd\[28554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.3.197
Jul 30 04:19:47 amit sshd\[28554\]: Failed password for invalid user ellen from 49.234.3.197 port 56460 ssh2
...
2019-07-30 17:25:19
183.224.78.176 attackbots
2323/tcp 23/tcp...
[2019-06-02/07-29]11pkt,2pt.(tcp)
2019-07-30 17:33:59
113.61.206.160 attackbotsspam
23/tcp 81/tcp
[2019-06-22/07-29]2pkt
2019-07-30 17:36:38
104.236.56.205 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-07-30 16:51:55
46.101.223.241 attack
FTP Brute-Force reported by Fail2Ban
2019-07-30 17:19:28
89.248.172.85 attackspam
30.07.2019 09:05:16 Connection to port 6124 blocked by firewall
2019-07-30 17:22:38
103.237.175.114 attack
445/tcp 445/tcp 445/tcp...
[2019-05-29/07-29]5pkt,1pt.(tcp)
2019-07-30 16:50:56
219.73.58.61 attackspambots
60001/tcp 5555/tcp 60001/tcp
[2019-07-17/29]3pkt
2019-07-30 17:02:58

Recently Reported IPs

188.124.163.122 126.125.144.65 103.233.117.116 76.100.100.253
45.138.96.185 185.254.63.37 179.253.31.232 101.9.205.208
168.39.45.155 214.45.132.72 62.45.37.154 107.108.199.128
172.27.52.114 190.7.186.249 17.145.248.145 48.31.122.7
210.138.24.197 67.230.184.210 59.124.164.226 10.217.108.131