Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.7.229.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.7.229.11.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013000 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 20:26:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 11.229.7.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.229.7.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.142.76.202 attackspambots
79.142.76.202 - - [26/Aug/2020:15:06:54 +0200] "GET http://n1.n2.n3.n4/phpmyadmin/ HTTP/1.1" 301 0 "-" "Mozilla/5.0 (Macintosh; Intel Mac OS X 10_8_5) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/33.0.1750.146 Safari/537.36"
:
54 x
:
79.142.76.202 - - [26/Aug/2020:23:10:31 +0200] "GET http://n1.n2.n3.n4/nl/error-page/index.aspx?404;http://cs.vu.nl:80/phpminiadmin.php HTTP/1.1" 200 333 "-" "Opera/9.80 (Macintosh; Intel Mac OS X 10.7.5) Presto/2.12.388 Version/12.11"
2020-08-27 18:57:08
192.241.224.33 attackbots
" "
2020-08-27 19:14:48
8.24.110.196 attackbots
Brute forcing email accounts
2020-08-27 18:45:58
103.217.89.232 attackbots
Portscan detected
2020-08-27 18:40:54
119.29.252.23 attack
Aug 25 23:35:28 serwer sshd\[1176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.252.23  user=root
Aug 25 23:35:31 serwer sshd\[1176\]: Failed password for root from 119.29.252.23 port 50248 ssh2
Aug 25 23:44:39 serwer sshd\[2606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.252.23  user=root
...
2020-08-27 19:13:44
187.209.251.226 attackbots
Brute Force
2020-08-27 19:09:04
186.243.115.96 attack
Automatic report - Port Scan Attack
2020-08-27 19:02:28
122.252.205.212 attackbotsspam
Portscan detected
2020-08-27 19:08:39
123.31.38.147 attack
Port Scan detected!
...
2020-08-27 18:52:02
185.143.172.80 attackbots
\[Thu Aug 27 05:43:08.776451 2020\] \[access_compat:error\] \[pid 31007:tid 140481241499392\] \[client 185.143.172.80:61557\] AH01797: client denied by server configuration: /web/auskunft-vom-anwalt/www/htdocs_cms/forum, referer: http://www.familienrecht-rabe.de/forum/
\[Thu Aug 27 05:43:08.889375 2020\] \[access_compat:error\] \[pid 31007:tid 140481191143168\] \[client 185.143.172.80:61566\] AH01797: client denied by server configuration: /web/auskunft-vom-anwalt/www/htdocs_cms/, referer: http://www.familienrecht-rabe.de/forum/
\[Thu Aug 27 05:43:09.116441 2020\] \[access_compat:error\] \[pid 31007:tid 140481157572352\] \[client 185.143.172.80:61586\] AH01797: client denied by server configuration: /web/auskunft-vom-anwalt/www/htdocs_cms/, referer: http://www.familienrecht-rabe.de/
...
2020-08-27 19:09:38
111.72.194.142 attackbotsspam
Aug 27 07:05:04 srv01 postfix/smtpd\[6994\]: warning: unknown\[111.72.194.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 07:15:25 srv01 postfix/smtpd\[6994\]: warning: unknown\[111.72.194.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 07:15:37 srv01 postfix/smtpd\[6994\]: warning: unknown\[111.72.194.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 07:15:53 srv01 postfix/smtpd\[6994\]: warning: unknown\[111.72.194.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug 27 07:16:13 srv01 postfix/smtpd\[6994\]: warning: unknown\[111.72.194.142\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-27 19:05:25
73.183.244.249 attack
2020-08-27T03:42:49.601393vps1033 sshd[26863]: Invalid user admin from 73.183.244.249 port 39442
2020-08-27T03:42:49.654504vps1033 sshd[26863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=c-73-183-244-249.hsd1.tx.comcast.net
2020-08-27T03:42:49.601393vps1033 sshd[26863]: Invalid user admin from 73.183.244.249 port 39442
2020-08-27T03:42:51.726127vps1033 sshd[26863]: Failed password for invalid user admin from 73.183.244.249 port 39442 ssh2
2020-08-27T03:42:52.258537vps1033 sshd[26967]: Invalid user admin from 73.183.244.249 port 39539
...
2020-08-27 19:16:11
167.99.12.47 attackspambots
Attempt to hack Wordpress Login, XMLRPC or other login
2020-08-27 19:07:39
1.0.215.132 attackspam
Lines containing failures of 1.0.215.132
Aug 27 02:18:56 mailserver sshd[6985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.0.215.132  user=r.r
Aug 27 02:18:58 mailserver sshd[6985]: Failed password for r.r from 1.0.215.132 port 48722 ssh2
Aug 27 02:18:59 mailserver sshd[6985]: Received disconnect from 1.0.215.132 port 48722:11: Bye Bye [preauth]
Aug 27 02:18:59 mailserver sshd[6985]: Disconnected from authenticating user r.r 1.0.215.132 port 48722 [preauth]
Aug 27 02:29:05 mailserver sshd[8132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.0.215.132  user=r.r
Aug 27 02:29:07 mailserver sshd[8132]: Failed password for r.r from 1.0.215.132 port 57030 ssh2
Aug 27 02:29:07 mailserver sshd[8132]: Received disconnect from 1.0.215.132 port 57030:11: Bye Bye [preauth]
Aug 27 02:29:07 mailserver sshd[8132]: Disconnected from authenticating user r.r 1.0.215.132 port 57030 [preauth]
Aug 27 0........
------------------------------
2020-08-27 19:21:31
223.64.193.247 attackspambots
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
2020-08-27 18:51:27

Recently Reported IPs

208.36.81.38 217.33.141.187 5.233.103.128 193.24.164.177
155.88.121.184 189.168.191.59 98.196.180.90 237.200.253.62
28.172.231.130 150.177.227.28 222.202.153.196 24.48.39.175
65.44.135.50 66.215.225.154 255.62.42.112 4.101.0.181
165.232.188.96 127.225.64.6 140.12.147.111 192.207.131.178