Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.98.72.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30800
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.98.72.82.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 21:46:38 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 82.72.98.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 82.72.98.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
52.117.12.19 attackbotsspam
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-07-31T07:09:12Z and 2020-07-31T07:17:24Z
2020-07-31 16:19:21
94.246.180.23 attack
Unauthorized connection attempt detected from IP address 94.246.180.23 to port 23
2020-07-31 16:37:50
193.32.161.143 attackspambots
07/31/2020-04:21:25.296981 193.32.161.143 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-07-31 16:30:52
111.229.63.223 attack
Invalid user xiangzhaokun from 111.229.63.223 port 49864
2020-07-31 16:37:21
202.70.72.217 attackspambots
$f2bV_matches
2020-07-31 16:51:16
91.121.175.61 attackbots
 TCP (SYN) 91.121.175.61:46377 -> port 30995, len 44
2020-07-31 16:15:46
49.233.130.95 attack
detected by Fail2Ban
2020-07-31 16:42:40
117.93.193.198 attackbotsspam
Jul 31 09:33:27 efa1 sshd[11648]: Invalid user misp from 117.93.193.198
Jul 31 09:33:27 efa1 sshd[11648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.93.193.198 
Jul 31 09:33:29 efa1 sshd[11648]: Failed password for invalid user misp from 117.93.193.198 port 53269 ssh2
Jul 31 09:34:07 efa1 sshd[11865]: Invalid user osbash from 117.93.193.198
Jul 31 09:34:08 efa1 sshd[11865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.93.193.198 

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.93.193.198
2020-07-31 16:11:18
41.231.54.123 attackspambots
Invalid user postgresql from 41.231.54.123 port 52242
2020-07-31 16:35:37
218.92.0.249 attack
Jul 31 01:15:44 dignus sshd[7307]: Failed password for root from 218.92.0.249 port 52209 ssh2
Jul 31 01:15:47 dignus sshd[7307]: Failed password for root from 218.92.0.249 port 52209 ssh2
Jul 31 01:15:51 dignus sshd[7307]: Failed password for root from 218.92.0.249 port 52209 ssh2
Jul 31 01:15:54 dignus sshd[7307]: Failed password for root from 218.92.0.249 port 52209 ssh2
Jul 31 01:15:57 dignus sshd[7307]: Failed password for root from 218.92.0.249 port 52209 ssh2
...
2020-07-31 16:18:37
103.80.55.19 attackbotsspam
2020-07-31T06:48:18.298520abusebot-7.cloudsearch.cf sshd[598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.55.19  user=root
2020-07-31T06:48:19.710072abusebot-7.cloudsearch.cf sshd[598]: Failed password for root from 103.80.55.19 port 53576 ssh2
2020-07-31T06:50:47.730690abusebot-7.cloudsearch.cf sshd[610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.55.19  user=root
2020-07-31T06:50:49.598536abusebot-7.cloudsearch.cf sshd[610]: Failed password for root from 103.80.55.19 port 33280 ssh2
2020-07-31T06:53:18.181105abusebot-7.cloudsearch.cf sshd[627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.80.55.19  user=root
2020-07-31T06:53:20.781359abusebot-7.cloudsearch.cf sshd[627]: Failed password for root from 103.80.55.19 port 41226 ssh2
2020-07-31T06:55:43.097929abusebot-7.cloudsearch.cf sshd[635]: pam_unix(sshd:auth): authentication failure; l
...
2020-07-31 16:15:05
159.65.9.174 attack
159.65.9.174 - - [31/Jul/2020:08:18:16 +0100] "POST /wp-login.php HTTP/1.1" 200 2178 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.65.9.174 - - [31/Jul/2020:08:18:21 +0100] "POST /wp-login.php HTTP/1.1" 200 2154 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.65.9.174 - - [31/Jul/2020:08:18:22 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-31 16:33:13
192.232.192.219 attack
192.232.192.219 - - [31/Jul/2020:04:51:30 +0100] "POST /wp-login.php HTTP/1.1" 200 1969 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.232.192.219 - - [31/Jul/2020:04:51:33 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
192.232.192.219 - - [31/Jul/2020:04:51:34 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-31 16:20:53
222.186.15.62 attackspam
Jul 31 10:41:21 santamaria sshd\[13909\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.62  user=root
Jul 31 10:41:23 santamaria sshd\[13909\]: Failed password for root from 222.186.15.62 port 42314 ssh2
Jul 31 10:41:25 santamaria sshd\[13909\]: Failed password for root from 222.186.15.62 port 42314 ssh2
...
2020-07-31 16:44:36
58.87.97.166 attackspam
Jul 30 18:38:39 tdfoods sshd\[6475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.97.166  user=root
Jul 30 18:38:41 tdfoods sshd\[6475\]: Failed password for root from 58.87.97.166 port 55730 ssh2
Jul 30 18:42:19 tdfoods sshd\[6851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.97.166  user=root
Jul 30 18:42:21 tdfoods sshd\[6851\]: Failed password for root from 58.87.97.166 port 50294 ssh2
Jul 30 18:47:54 tdfoods sshd\[7212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.97.166  user=root
2020-07-31 16:42:23

Recently Reported IPs

219.9.79.10 231.54.85.71 71.98.9.229 216.72.153.166
251.52.33.244 86.91.182.197 23.113.87.90 91.77.80.96
192.26.60.209 241.53.233.223 13.20.43.65 246.143.171.239
119.105.208.164 252.95.177.112 92.181.52.201 64.96.204.232
139.221.165.100 97.76.221.207 89.140.77.89 243.138.42.226