Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.99.168.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4223
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.99.168.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:15:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 164.168.99.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 164.168.99.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
173.226.178.72 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 02:58:29,562 INFO [amun_request_handler] PortScan Detected on Port: 445 (173.226.178.72)
2019-07-02 12:19:02
153.36.236.242 attackbotsspam
Automatic report - Web App Attack
2019-07-02 12:22:47
46.166.151.47 attackspambots
\[2019-07-02 00:27:39\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-02T00:27:39.879-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="81046363302946",SessionID="0x7f02f82b2728",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/64486",ACLName="no_extension_match"
\[2019-07-02 00:30:29\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-02T00:30:29.202-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="981046363302946",SessionID="0x7f02f84a0628",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/54480",ACLName="no_extension_match"
\[2019-07-02 00:33:21\] SECURITY\[13451\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-02T00:33:21.936-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0046363302946",SessionID="0x7f02f84a0628",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/55945",ACLName="no_ext
2019-07-02 12:39:00
163.172.11.200 attackspam
Automatic report - Web App Attack
2019-07-02 12:23:06
153.36.233.244 attackspambots
scan r
2019-07-02 12:44:42
123.206.27.113 attackbotsspam
Jul  2 05:52:15 dev0-dcde-rnet sshd[7931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.27.113
Jul  2 05:52:17 dev0-dcde-rnet sshd[7931]: Failed password for invalid user ck from 123.206.27.113 port 60454 ssh2
Jul  2 05:55:40 dev0-dcde-rnet sshd[7948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.27.113
2019-07-02 12:16:22
185.38.3.138 attackbots
Jul  2 05:55:05 web2 sshd[2483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.38.3.138
Jul  2 05:55:07 web2 sshd[2483]: Failed password for invalid user user5 from 185.38.3.138 port 56700 ssh2
2019-07-02 12:34:14
36.91.24.27 attackbots
Jul  2 00:18:10 vps200512 sshd\[10955\]: Invalid user pavel from 36.91.24.27
Jul  2 00:18:10 vps200512 sshd\[10955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.24.27
Jul  2 00:18:12 vps200512 sshd\[10955\]: Failed password for invalid user pavel from 36.91.24.27 port 34300 ssh2
Jul  2 00:20:52 vps200512 sshd\[11044\]: Invalid user gentoo from 36.91.24.27
Jul  2 00:20:52 vps200512 sshd\[11044\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.91.24.27
2019-07-02 12:57:47
103.44.235.138 attackspambots
DATE:2019-07-02 05:54:27, IP:103.44.235.138, PORT:ssh brute force auth on SSH service (patata)
2019-07-02 12:53:41
49.49.245.238 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2019-07-02 12:41:22
177.97.0.238 attackspam
Jul  2 06:45:14 vps647732 sshd[13739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.97.0.238
Jul  2 06:45:16 vps647732 sshd[13739]: Failed password for invalid user glassfish from 177.97.0.238 port 47368 ssh2
...
2019-07-02 12:54:29
152.136.72.17 attackspambots
Jul  2 05:49:41 Ubuntu-1404-trusty-64-minimal sshd\[1295\]: Invalid user dsc from 152.136.72.17
Jul  2 05:49:41 Ubuntu-1404-trusty-64-minimal sshd\[1295\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.72.17
Jul  2 05:49:42 Ubuntu-1404-trusty-64-minimal sshd\[1295\]: Failed password for invalid user dsc from 152.136.72.17 port 55950 ssh2
Jul  2 05:54:33 Ubuntu-1404-trusty-64-minimal sshd\[5927\]: Invalid user robin from 152.136.72.17
Jul  2 05:54:33 Ubuntu-1404-trusty-64-minimal sshd\[5927\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.72.17
2019-07-02 12:51:43
203.129.219.198 attackbotsspam
Jul  2 05:52:38 heissa sshd\[25757\]: Invalid user cesar from 203.129.219.198 port 35250
Jul  2 05:52:38 heissa sshd\[25757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.219.198
Jul  2 05:52:40 heissa sshd\[25757\]: Failed password for invalid user cesar from 203.129.219.198 port 35250 ssh2
Jul  2 05:55:18 heissa sshd\[26022\]: Invalid user administrator from 203.129.219.198 port 55934
Jul  2 05:55:18 heissa sshd\[26022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.129.219.198
2019-07-02 12:25:38
201.163.180.183 attackbots
Jul  2 09:48:23 tanzim-HP-Z238-Microtower-Workstation sshd\[18402\]: Invalid user xv from 201.163.180.183
Jul  2 09:48:23 tanzim-HP-Z238-Microtower-Workstation sshd\[18402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.163.180.183
Jul  2 09:48:25 tanzim-HP-Z238-Microtower-Workstation sshd\[18402\]: Failed password for invalid user xv from 201.163.180.183 port 38023 ssh2
...
2019-07-02 12:25:13
186.90.178.112 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-02 02:56:02,919 INFO [amun_request_handler] PortScan Detected on Port: 445 (186.90.178.112)
2019-07-02 12:46:35

Recently Reported IPs

179.148.148.56 250.30.103.220 132.95.33.163 42.78.191.1
56.20.156.170 251.38.53.238 173.134.49.53 245.245.51.240
20.23.1.73 78.199.20.157 175.3.198.202 230.237.2.250
57.79.48.255 137.65.196.36 63.147.163.250 94.184.48.118
4.178.207.150 232.189.42.26 89.87.104.94 160.233.165.171