Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.242.125.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14263
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.242.125.209.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 20:33:23 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 209.125.242.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 209.125.242.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.206.221.18 attack
Bad bot/spoofed identity
2019-07-14 09:12:04
12.34.56.18 attack
Jul 14 03:07:34 legacy sshd[8610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.34.56.18
Jul 14 03:07:37 legacy sshd[8610]: Failed password for invalid user alex from 12.34.56.18 port 59582 ssh2
Jul 14 03:12:52 legacy sshd[8785]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.34.56.18
...
2019-07-14 09:22:10
46.173.72.141 attackbots
8080/tcp
[2019-07-13]1pkt
2019-07-14 09:23:02
123.235.245.236 attackbotsspam
23/tcp
[2019-07-13]1pkt
2019-07-14 09:52:57
111.206.198.119 attackspam
Bad bot/spoofed identity
2019-07-14 09:19:47
68.109.221.72 attack
81/tcp
[2019-07-13]1pkt
2019-07-14 09:34:39
160.153.234.236 attack
Jul 14 02:36:18 MainVPS sshd[12356]: Invalid user mh from 160.153.234.236 port 33102
Jul 14 02:36:18 MainVPS sshd[12356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.153.234.236
Jul 14 02:36:18 MainVPS sshd[12356]: Invalid user mh from 160.153.234.236 port 33102
Jul 14 02:36:20 MainVPS sshd[12356]: Failed password for invalid user mh from 160.153.234.236 port 33102 ssh2
Jul 14 02:40:47 MainVPS sshd[12769]: Invalid user ftpadmin from 160.153.234.236 port 36486
...
2019-07-14 09:50:25
188.18.65.162 attackspam
8080/tcp
[2019-07-13]1pkt
2019-07-14 09:25:42
71.165.90.119 attackbotsspam
Automatic report - Banned IP Access
2019-07-14 09:25:16
80.245.88.2 attack
Automatic report - Port Scan Attack
2019-07-14 09:45:58
180.122.30.253 attack
[portscan] Port scan
2019-07-14 09:53:42
46.237.207.106 attackbots
Jul 14 03:38:47 vps691689 sshd[27853]: Failed password for root from 46.237.207.106 port 35314 ssh2
Jul 14 03:44:04 vps691689 sshd[27917]: Failed password for root from 46.237.207.106 port 38858 ssh2
...
2019-07-14 09:44:29
111.206.198.77 attackspam
Bad bot/spoofed identity
2019-07-14 09:14:16
218.92.0.182 attackbotsspam
Password brute force against sshd
2019-07-14 09:47:55
111.206.198.27 attackspambots
Bad bot/spoofed identity
2019-07-14 09:12:28

Recently Reported IPs

198.248.186.212 56.3.206.170 95.223.73.82 85.124.65.90
32.44.189.224 15.141.239.121 3.135.187.36 233.182.111.32
153.56.148.30 155.102.157.228 16.119.183.127 176.196.118.141
75.32.73.168 74.180.28.105 41.162.50.209 147.217.221.71
152.240.192.110 145.40.51.29 125.207.161.122 150.53.229.21