Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.73.164.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50516
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.73.164.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011801 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 19 02:50:01 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 242.164.73.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.164.73.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
125.160.66.32 attackspambots
Invalid user ucc from 125.160.66.32 port 1982
2020-05-23 14:11:04
51.254.37.192 attackbots
Invalid user hqv from 51.254.37.192 port 44100
2020-05-23 14:31:07
132.232.30.87 attack
May 23 06:45:06 odroid64 sshd\[11794\]: Invalid user etg from 132.232.30.87
May 23 06:45:06 odroid64 sshd\[11794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.30.87
...
2020-05-23 14:07:43
160.20.225.2 attackbots
Invalid user pi from 160.20.225.2 port 60724
2020-05-23 14:02:22
106.75.28.38 attack
May 23 06:24:15 mail sshd[24534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.28.38 
May 23 06:24:17 mail sshd[24534]: Failed password for invalid user rhh from 106.75.28.38 port 56134 ssh2
...
2020-05-23 14:17:51
49.233.134.252 attackbots
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-05-23 14:32:05
129.226.138.179 attack
Invalid user akashn from 129.226.138.179 port 60428
2020-05-23 14:08:16
103.129.223.98 attack
Invalid user zlk from 103.129.223.98 port 43744
2020-05-23 14:20:39
106.12.173.149 attack
May 23 01:34:51 ny01 sshd[5483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.173.149
May 23 01:34:54 ny01 sshd[5483]: Failed password for invalid user xfg from 106.12.173.149 port 45640 ssh2
May 23 01:37:16 ny01 sshd[5763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.173.149
2020-05-23 14:18:47
125.209.80.130 attack
Invalid user origin from 125.209.80.130 port 2372
2020-05-23 14:10:27
128.199.102.17 attack
May 23 13:03:43 web1 sshd[22884]: Invalid user jwe from 128.199.102.17 port 37707
May 23 13:03:43 web1 sshd[22884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.102.17
May 23 13:03:43 web1 sshd[22884]: Invalid user jwe from 128.199.102.17 port 37707
May 23 13:03:45 web1 sshd[22884]: Failed password for invalid user jwe from 128.199.102.17 port 37707 ssh2
May 23 16:00:23 web1 sshd[1793]: Invalid user h from 128.199.102.17 port 56353
May 23 16:00:23 web1 sshd[1793]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.102.17
May 23 16:00:23 web1 sshd[1793]: Invalid user h from 128.199.102.17 port 56353
May 23 16:00:24 web1 sshd[1793]: Failed password for invalid user h from 128.199.102.17 port 56353 ssh2
May 23 16:02:16 web1 sshd[2257]: Invalid user wvc from 128.199.102.17 port 42181
...
2020-05-23 14:09:48
41.50.77.94 attackspambots
Invalid user admin from 41.50.77.94 port 57552
2020-05-23 14:37:36
46.32.124.146 attackbots
Invalid user service from 46.32.124.146 port 55538
2020-05-23 14:34:03
150.223.13.40 attackspambots
Invalid user fsz from 150.223.13.40 port 59916
2020-05-23 14:05:14
82.102.198.32 attackspam
Invalid user admin from 82.102.198.32 port 61073
2020-05-23 14:27:26

Recently Reported IPs

123.61.37.4 30.240.106.91 229.221.19.222 127.59.19.195
209.10.150.23 160.70.130.138 75.87.60.157 99.113.53.36
33.195.240.158 197.244.223.149 93.5.34.154 73.88.165.245
150.120.132.43 72.20.234.175 138.30.1.138 229.21.76.166
156.65.34.71 105.192.128.24 35.175.53.115 66.127.58.135