Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.70.233.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.70.233.248.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121502 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 12:14:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 248.233.70.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.233.70.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.121.184.184 attackspambots
Oct 31 14:01:01 nextcloud sshd\[18523\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.184.184  user=root
Oct 31 14:01:03 nextcloud sshd\[18523\]: Failed password for root from 91.121.184.184 port 50709 ssh2
Oct 31 14:04:43 nextcloud sshd\[24092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.184.184  user=root
...
2019-10-31 21:30:13
103.14.99.241 attackspambots
Oct 31 13:58:44 vps647732 sshd[21004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.14.99.241
Oct 31 13:58:45 vps647732 sshd[21004]: Failed password for invalid user hostelry from 103.14.99.241 port 33962 ssh2
...
2019-10-31 21:27:51
43.248.186.221 attackspam
Oct 31 13:49:27 markkoudstaal sshd[17813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.248.186.221
Oct 31 13:49:29 markkoudstaal sshd[17813]: Failed password for invalid user reboot from 43.248.186.221 port 35958 ssh2
Oct 31 13:55:24 markkoudstaal sshd[18407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.248.186.221
2019-10-31 21:10:54
45.227.253.140 attackbots
2019-10-31 14:16:43 dovecot_login authenticator failed for \(hosting-by.directwebhost.org.\) \[45.227.253.140\]: 535 Incorrect authentication data \(set_id=postmaster@nophost.com\)
2019-10-31 14:16:50 dovecot_login authenticator failed for \(hosting-by.directwebhost.org.\) \[45.227.253.140\]: 535 Incorrect authentication data \(set_id=postmaster\)
2019-10-31 14:18:04 dovecot_login authenticator failed for \(hosting-by.directwebhost.org.\) \[45.227.253.140\]: 535 Incorrect authentication data \(set_id=support@nophost.com\)
2019-10-31 14:18:11 dovecot_login authenticator failed for \(hosting-by.directwebhost.org.\) \[45.227.253.140\]: 535 Incorrect authentication data \(set_id=support\)
2019-10-31 14:23:49 dovecot_login authenticator failed for \(hosting-by.directwebhost.org.\) \[45.227.253.140\]: 535 Incorrect authentication data \(set_id=info@orogest.it\)
2019-10-31 21:25:31
212.47.250.50 attack
Oct 31 13:07:08 vpn01 sshd[1557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.47.250.50
Oct 31 13:07:10 vpn01 sshd[1557]: Failed password for invalid user teamspeak from 212.47.250.50 port 60728 ssh2
...
2019-10-31 21:20:33
114.67.76.63 attackbotsspam
Oct 31 13:08:23 game-panel sshd[18884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.76.63
Oct 31 13:08:24 game-panel sshd[18884]: Failed password for invalid user rochester from 114.67.76.63 port 36782 ssh2
Oct 31 13:14:13 game-panel sshd[19137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.76.63
2019-10-31 21:18:37
222.112.65.55 attackspambots
Oct 31 13:09:20 anodpoucpklekan sshd[81485]: Invalid user bioboy from 222.112.65.55 port 53958
...
2019-10-31 21:42:55
159.89.1.19 attack
WordPress login Brute force / Web App Attack on client site.
2019-10-31 21:33:26
187.237.217.18 attack
Oct 31 14:33:53 MK-Soft-VM5 sshd[5068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.237.217.18 
Oct 31 14:33:56 MK-Soft-VM5 sshd[5068]: Failed password for invalid user futyn007 from 187.237.217.18 port 53957 ssh2
...
2019-10-31 21:41:41
162.216.224.175 attackbots
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-31 21:33:11
112.85.42.89 attackspam
Oct 31 14:08:33 ns381471 sshd[1048]: Failed password for root from 112.85.42.89 port 14613 ssh2
2019-10-31 21:40:17
159.203.169.16 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-31 21:25:00
185.232.67.5 attackspambots
Oct 31 14:24:30 dedicated sshd[14618]: Invalid user admin from 185.232.67.5 port 34453
2019-10-31 21:49:53
62.90.235.90 attackspam
Invalid user gk from 62.90.235.90 port 50900
2019-10-31 21:43:53
139.180.222.30 attackspambots
Oct 31 14:50:04 server sshd\[9865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.222.30  user=root
Oct 31 14:50:06 server sshd\[9865\]: Failed password for root from 139.180.222.30 port 54364 ssh2
Oct 31 15:06:57 server sshd\[13679\]: Invalid user alex from 139.180.222.30
Oct 31 15:06:57 server sshd\[13679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.180.222.30 
Oct 31 15:06:59 server sshd\[13679\]: Failed password for invalid user alex from 139.180.222.30 port 44644 ssh2
...
2019-10-31 21:26:45

Recently Reported IPs

128.224.61.212 187.206.155.123 245.65.81.120 12.228.170.12
221.238.168.118 240.219.8.252 151.217.88.115 156.66.235.122
73.229.124.20 117.194.206.5 169.176.58.143 114.72.29.237
47.86.140.141 221.20.145.216 230.74.244.187 18.248.236.9
2.32.221.239 185.101.222.72 234.231.187.163 185.149.195.100