Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.80.132.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.80.132.215.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 19:23:20 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 215.132.80.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 215.132.80.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.121.175 attack
SSH bruteforce
2019-11-30 02:00:32
207.154.193.178 attackspambots
2019-11-29T17:16:41.347930abusebot-6.cloudsearch.cf sshd\[14047\]: Invalid user updater123 from 207.154.193.178 port 52582
2019-11-30 02:19:16
195.154.154.88 attackspam
Port scan detected on ports: 1222[TCP], 2022[TCP], 28[TCP]
2019-11-30 02:13:36
34.92.247.140 attack
2019-11-29T15:43:17.976276abusebot.cloudsearch.cf sshd\[32636\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.247.92.34.bc.googleusercontent.com  user=root
2019-11-30 02:07:30
185.176.27.42 attack
Portscan or hack attempt detected by psad/fwsnort
2019-11-30 02:21:12
185.156.73.38 attackbotsspam
11/29/2019-13:08:30.782050 185.156.73.38 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-30 02:30:51
80.150.162.146 attack
(sshd) Failed SSH login from 80.150.162.146 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Nov 29 17:19:32 s1 sshd[18560]: Invalid user douglas from 80.150.162.146 port 37352
Nov 29 17:19:34 s1 sshd[18560]: Failed password for invalid user douglas from 80.150.162.146 port 37352 ssh2
Nov 29 17:34:38 s1 sshd[18821]: Invalid user roccaforte from 80.150.162.146 port 33120
Nov 29 17:34:39 s1 sshd[18821]: Failed password for invalid user roccaforte from 80.150.162.146 port 33120 ssh2
Nov 29 17:40:33 s1 sshd[19002]: Invalid user guest from 80.150.162.146 port 35222
2019-11-30 01:54:55
83.55.132.62 attackspam
port scan/probe/communication attempt
2019-11-30 02:23:10
183.48.91.150 attack
2019-11-29T17:08:27.798697hub.schaetter.us sshd\[28378\]: Invalid user server from 183.48.91.150 port 54174
2019-11-29T17:08:27.816990hub.schaetter.us sshd\[28378\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.48.91.150
2019-11-29T17:08:29.655279hub.schaetter.us sshd\[28378\]: Failed password for invalid user server from 183.48.91.150 port 54174 ssh2
2019-11-29T17:13:26.775221hub.schaetter.us sshd\[28462\]: Invalid user reception2 from 183.48.91.150 port 60900
2019-11-29T17:13:26.798659hub.schaetter.us sshd\[28462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.48.91.150
...
2019-11-30 01:58:29
183.250.110.124 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-30 02:31:18
95.86.34.46 attack
Automatic report - Port Scan Attack
2019-11-30 01:57:22
169.197.108.188 attack
firewall-block, port(s): 443/tcp
2019-11-30 02:32:23
51.75.255.166 attackspam
Nov 29 18:46:06 lnxweb61 sshd[16628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.255.166
Nov 29 18:46:07 lnxweb61 sshd[16628]: Failed password for invalid user holli from 51.75.255.166 port 51484 ssh2
Nov 29 18:48:41 lnxweb61 sshd[18654]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.255.166
2019-11-30 01:54:03
168.90.88.50 attack
Nov 29 13:20:58 ws12vmsma01 sshd[32431]: Invalid user jameela from 168.90.88.50
Nov 29 13:21:00 ws12vmsma01 sshd[32431]: Failed password for invalid user jameela from 168.90.88.50 port 53082 ssh2
Nov 29 13:25:03 ws12vmsma01 sshd[32991]: Invalid user http from 168.90.88.50
...
2019-11-30 02:17:37
185.209.0.51 attack
11/29/2019-12:49:16.196886 185.209.0.51 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-30 02:26:27

Recently Reported IPs

93.151.226.189 97.193.2.188 187.119.114.194 152.246.147.10
243.231.77.46 97.237.217.132 70.92.169.251 156.1.130.166
131.36.98.186 157.175.25.96 74.122.172.120 88.92.141.134
5.1.63.48 248.126.99.194 34.230.74.27 85.156.119.139
233.202.112.90 154.157.144.11 40.108.174.197 218.196.57.207