Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.73.169.89
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52202
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.73.169.89.			IN	A

;; AUTHORITY SECTION:
.			24	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 03 15:48:53 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 89.169.73.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 89.169.73.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.81.226.57 attackspambots
0,16-05/15 [bc01/m06] PostRequest-Spammer scoring: brussels
2020-10-11 08:22:29
188.166.185.236 attack
2020-10-11T01:03:47.487777lavrinenko.info sshd[9025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.185.236
2020-10-11T01:03:47.480361lavrinenko.info sshd[9025]: Invalid user jesse from 188.166.185.236 port 60483
2020-10-11T01:03:49.974767lavrinenko.info sshd[9025]: Failed password for invalid user jesse from 188.166.185.236 port 60483 ssh2
2020-10-11T01:07:11.573144lavrinenko.info sshd[9143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.185.236  user=root
2020-10-11T01:07:14.066933lavrinenko.info sshd[9143]: Failed password for root from 188.166.185.236 port 51873 ssh2
...
2020-10-11 08:28:54
140.210.90.197 attack
Oct 11 00:28:46 vps639187 sshd\[18309\]: Invalid user tomcat2 from 140.210.90.197 port 34716
Oct 11 00:28:46 vps639187 sshd\[18309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.210.90.197
Oct 11 00:28:48 vps639187 sshd\[18309\]: Failed password for invalid user tomcat2 from 140.210.90.197 port 34716 ssh2
...
2020-10-11 07:56:11
192.241.155.88 attack
Oct 10 20:47:21 scw-gallant-ride sshd[14918]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.155.88
2020-10-11 08:07:27
187.190.40.112 attackbotsspam
Oct 11 00:51:07 s1 sshd\[15852\]: Invalid user gpadmin from 187.190.40.112 port 11521
Oct 11 00:51:07 s1 sshd\[15852\]: Failed password for invalid user gpadmin from 187.190.40.112 port 11521 ssh2
Oct 11 00:55:02 s1 sshd\[16064\]: Invalid user user3 from 187.190.40.112 port 17568
Oct 11 00:55:02 s1 sshd\[16064\]: Failed password for invalid user user3 from 187.190.40.112 port 17568 ssh2
Oct 11 00:58:51 s1 sshd\[17065\]: Invalid user uk from 187.190.40.112 port 48231
Oct 11 00:58:51 s1 sshd\[17065\]: Failed password for invalid user uk from 187.190.40.112 port 48231 ssh2
...
2020-10-11 08:11:22
106.13.75.102 attackspam
Oct 10 23:49:51 abendstille sshd\[17372\]: Invalid user seb from 106.13.75.102
Oct 10 23:49:51 abendstille sshd\[17372\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.75.102
Oct 10 23:49:53 abendstille sshd\[17372\]: Failed password for invalid user seb from 106.13.75.102 port 60748 ssh2
Oct 10 23:53:46 abendstille sshd\[21661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.75.102  user=root
Oct 10 23:53:48 abendstille sshd\[21661\]: Failed password for root from 106.13.75.102 port 59958 ssh2
...
2020-10-11 08:04:23
141.98.9.33 attackbots
Oct 11 00:01:52 scw-tender-jepsen sshd[22786]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.33
Oct 11 00:01:55 scw-tender-jepsen sshd[22786]: Failed password for invalid user admin from 141.98.9.33 port 44511 ssh2
2020-10-11 08:10:42
190.85.163.46 attackspam
Oct 11 02:33:30 rancher-0 sshd[590162]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.85.163.46  user=root
Oct 11 02:33:32 rancher-0 sshd[590162]: Failed password for root from 190.85.163.46 port 45147 ssh2
...
2020-10-11 08:34:55
59.72.122.148 attack
Oct 11 05:39:40 mx sshd[1339666]: Invalid user 1234qwer from 59.72.122.148 port 42964
Oct 11 05:39:40 mx sshd[1339666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.72.122.148 
Oct 11 05:39:40 mx sshd[1339666]: Invalid user 1234qwer from 59.72.122.148 port 42964
Oct 11 05:39:42 mx sshd[1339666]: Failed password for invalid user 1234qwer from 59.72.122.148 port 42964 ssh2
Oct 11 05:43:26 mx sshd[1339708]: Invalid user darkhax2020? from 59.72.122.148 port 49490
...
2020-10-11 08:34:31
5.196.72.11 attack
Oct 10 20:46:51 ip-172-31-61-156 sshd[28343]: Invalid user bscw from 5.196.72.11
Oct 10 20:46:54 ip-172-31-61-156 sshd[28343]: Failed password for invalid user bscw from 5.196.72.11 port 41718 ssh2
Oct 10 20:46:51 ip-172-31-61-156 sshd[28343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.72.11
Oct 10 20:46:51 ip-172-31-61-156 sshd[28343]: Invalid user bscw from 5.196.72.11
Oct 10 20:46:54 ip-172-31-61-156 sshd[28343]: Failed password for invalid user bscw from 5.196.72.11 port 41718 ssh2
...
2020-10-11 08:33:32
177.220.174.2 attack
Oct  8 02:10:43 ns sshd[898]: Connection from 177.220.174.2 port 39613 on 134.119.39.98 port 22
Oct  8 02:10:44 ns sshd[898]: User r.r from 177.220.174.2 not allowed because not listed in AllowUsers
Oct  8 02:10:44 ns sshd[898]: Failed password for invalid user r.r from 177.220.174.2 port 39613 ssh2
Oct  8 02:10:44 ns sshd[898]: Received disconnect from 177.220.174.2 port 39613:11: Bye Bye [preauth]
Oct  8 02:10:44 ns sshd[898]: Disconnected from 177.220.174.2 port 39613 [preauth]
Oct  8 02:35:11 ns sshd[32626]: Connection from 177.220.174.2 port 37489 on 134.119.39.98 port 22
Oct  8 02:35:12 ns sshd[32626]: User r.r from 177.220.174.2 not allowed because not listed in AllowUsers
Oct  8 02:35:12 ns sshd[32626]: Failed password for invalid user r.r from 177.220.174.2 port 37489 ssh2
Oct  8 02:35:13 ns sshd[32626]: Received disconnect from 177.220.174.2 port 37489:11: Bye Bye [preauth]
Oct  8 02:35:13 ns sshd[32626]: Disconnected from 177.220.174.2 port 37489 [preauth]
Oc........
-------------------------------
2020-10-11 08:29:23
192.241.238.54 attackbots
Port scan: Attack repeated for 24 hours
2020-10-11 08:15:54
218.59.47.1 attackspam
[MK-VM4] Blocked by UFW
2020-10-11 08:18:10
142.93.99.114 attackspam
Automatic report - XMLRPC Attack
2020-10-11 08:04:01
173.12.157.141 attackbotsspam
SSH brute force
2020-10-11 08:24:33

Recently Reported IPs

180.135.186.166 189.119.35.94 188.135.116.251 29.174.42.199
185.36.159.172 15.122.28.102 15.78.86.232 202.190.81.146
233.161.32.191 67.169.205.40 229.176.225.163 199.86.214.250
156.120.248.137 156.167.143.174 133.106.22.97 41.127.101.13
167.156.59.118 171.118.206.128 81.0.112.8 121.65.234.241