Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.130.104.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10902
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;244.130.104.242.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:28:48 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 242.104.130.244.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.104.130.244.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.52.89 attackbots
Aug 13 09:50:08 Ubuntu-1404-trusty-64-minimal sshd\[17644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.89  user=root
Aug 13 09:50:10 Ubuntu-1404-trusty-64-minimal sshd\[17644\]: Failed password for root from 222.186.52.89 port 20840 ssh2
Aug 13 09:50:12 Ubuntu-1404-trusty-64-minimal sshd\[17644\]: Failed password for root from 222.186.52.89 port 20840 ssh2
Aug 13 09:50:13 Ubuntu-1404-trusty-64-minimal sshd\[17644\]: Failed password for root from 222.186.52.89 port 20840 ssh2
Aug 13 09:50:17 Ubuntu-1404-trusty-64-minimal sshd\[18817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.52.89  user=root
2019-08-13 16:22:32
50.28.245.51 attack
SMTP/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-08-13 16:38:31
86.104.220.20 attackspam
Aug 13 10:57:54 dedicated sshd[2636]: Invalid user test from 86.104.220.20 port 19842
2019-08-13 17:00:45
122.55.80.100 attack
Unauthorized connection attempt from IP address 122.55.80.100 on Port 445(SMB)
2019-08-13 16:52:11
103.94.122.46 attackbotsspam
Unauthorized connection attempt from IP address 103.94.122.46 on Port 445(SMB)
2019-08-13 16:50:06
115.70.196.41 attack
2019-08-13T07:21:29.340792Z 5fd87794e36c New connection: 115.70.196.41:48130 (172.17.0.3:2222) [session: 5fd87794e36c]
2019-08-13T07:34:30.739409Z 90fc19bc29d7 New connection: 115.70.196.41:52064 (172.17.0.3:2222) [session: 90fc19bc29d7]
2019-08-13 16:53:13
218.92.0.193 attack
Aug 13 10:01:18 apollo sshd\[12891\]: Failed password for root from 218.92.0.193 port 15995 ssh2Aug 13 10:01:21 apollo sshd\[12891\]: Failed password for root from 218.92.0.193 port 15995 ssh2Aug 13 10:01:24 apollo sshd\[12891\]: Failed password for root from 218.92.0.193 port 15995 ssh2
...
2019-08-13 16:14:28
86.57.207.113 attack
Unauthorized connection attempt from IP address 86.57.207.113 on Port 445(SMB)
2019-08-13 16:09:52
217.7.239.117 attackspam
Triggered by Fail2Ban at Vostok web server
2019-08-13 16:42:29
168.167.30.244 attackbots
Splunk® : Brute-Force login attempt on SSH:
Aug 13 04:49:29 testbed sshd[20413]: Disconnected from 168.167.30.244 port 35690 [preauth]
2019-08-13 16:52:38
165.22.7.99 attack
Aug 13 11:07:16 yabzik sshd[30791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.7.99
Aug 13 11:07:17 yabzik sshd[30791]: Failed password for invalid user marif from 165.22.7.99 port 42882 ssh2
Aug 13 11:11:58 yabzik sshd[32297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.7.99
2019-08-13 16:13:51
49.206.14.109 attackspam
Honeypot attack, port: 445, PTR: broadband.actcorp.in.
2019-08-13 17:06:17
46.233.203.187 attack
Unauthorized connection attempt from IP address 46.233.203.187 on Port 445(SMB)
2019-08-13 16:25:44
119.197.26.181 attackbots
Aug 13 10:01:11 tux-35-217 sshd\[14350\]: Invalid user tang from 119.197.26.181 port 45972
Aug 13 10:01:11 tux-35-217 sshd\[14350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.197.26.181
Aug 13 10:01:13 tux-35-217 sshd\[14350\]: Failed password for invalid user tang from 119.197.26.181 port 45972 ssh2
Aug 13 10:07:03 tux-35-217 sshd\[14402\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.197.26.181  user=root
...
2019-08-13 16:29:53
200.187.180.41 attack
Unauthorized connection attempt from IP address 200.187.180.41 on Port 445(SMB)
2019-08-13 16:17:55

Recently Reported IPs

76.158.175.198 59.161.244.141 208.136.95.124 135.104.24.140
20.223.5.102 61.1.147.167 242.135.3.249 241.14.2.52
25.212.14.150 97.101.45.177 128.61.23.154 113.12.10.37
161.109.1.128 103.137.180.129 72.187.108.191 37.24.147.22
54.7.187.14 39.74.131.94 28.29.158.139 80.194.163.121