Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.5.233.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34446
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.5.233.42.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 15:47:22 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 42.233.5.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.233.5.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.129.33.15 attackspam
[MK-Root1] Blocked by UFW
2020-10-01 07:22:56
5.188.156.92 attackspambots
firewall-block, port(s): 33389/tcp
2020-10-01 06:58:28
45.129.33.82 attack
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-01 07:21:15
60.251.183.90 attack
SSH login attempts.
2020-10-01 06:52:49
185.193.90.54 attackbots
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-01 07:03:33
193.27.228.154 attackbots
scans 16 times in preceeding hours on the ports (in chronological order) 4782 4721 3588 5177 4596 3784 4662 5156 5072 5493 4490 5079 4620 5262 5500 4785 resulting in total of 51 scans from 193.27.228.0/23 block.
2020-10-01 07:02:29
212.95.175.140 attack
 TCP (SYN) 212.95.175.140:41587 -> port 445, len 44
2020-10-01 06:59:06
104.206.128.38 attack
 TCP (SYN) 104.206.128.38:61435 -> port 1433, len 44
2020-10-01 07:08:03
195.54.161.105 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-10-01 07:01:00
42.240.129.58 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 23 - port: 8291 proto: tcp cat: Misc Attackbytes: 60
2020-10-01 07:24:31
195.246.57.116 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-10-01 06:59:36
45.227.255.204 attackbots
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-30T23:12:45Z
2020-10-01 07:17:56
92.118.161.33 attackbots
" "
2020-10-01 07:11:13
14.213.136.147 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-10-01 06:58:10
116.177.248.202 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 124
2020-10-01 07:05:44

Recently Reported IPs

201.77.88.71 175.171.45.178 229.153.163.70 224.50.97.201
193.204.72.52 96.173.86.192 222.165.191.116 50.14.39.178
97.35.133.144 206.128.239.200 45.242.174.0 134.115.218.167
255.36.110.10 211.57.128.243 241.163.229.35 231.71.247.202
205.241.52.165 62.60.184.7 74.25.171.41 82.90.245.114