Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.242.0.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38722
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.242.0.19.			IN	A

;; AUTHORITY SECTION:
.			356	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 17:43:36 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 19.0.242.47.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.0.242.47.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.174.24.33 attack
Unauthorized connection attempt detected from IP address 79.174.24.33 to port 1433
2020-03-26 14:19:28
104.144.155.42 attackspam
Registration form abuse
2020-03-26 13:49:21
220.231.127.6 attackbotsspam
Unauthorized connection attempt detected from IP address 220.231.127.6 to port 445
2020-03-26 14:27:37
49.232.132.10 attackbots
Mar 26 04:53:10 vmd17057 sshd[16673]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.132.10 
Mar 26 04:53:12 vmd17057 sshd[16673]: Failed password for invalid user honda from 49.232.132.10 port 37876 ssh2
...
2020-03-26 14:15:49
103.17.69.43 attackbots
Mar 26 00:53:30 firewall sshd[22585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.17.69.43
Mar 26 00:53:30 firewall sshd[22585]: Invalid user bathsheba from 103.17.69.43
Mar 26 00:53:33 firewall sshd[22585]: Failed password for invalid user bathsheba from 103.17.69.43 port 32129 ssh2
...
2020-03-26 13:57:09
78.85.210.114 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-03-26 13:51:55
51.254.49.100 attackbotsspam
" "
2020-03-26 14:25:25
212.64.33.206 attackspam
Invalid user kristofvps from 212.64.33.206 port 43274
2020-03-26 14:08:28
37.49.229.184 attackbotsspam
37.49.229.184 was recorded 6 times by 4 hosts attempting to connect to the following ports: 6950,5260,5961. Incident counter (4h, 24h, all-time): 6, 13, 123
2020-03-26 13:43:34
14.116.214.153 attack
Mar 26 05:09:57 mout sshd[10501]: Invalid user identd from 14.116.214.153 port 50546
2020-03-26 14:12:38
157.230.91.45 attackspambots
Invalid user import from 157.230.91.45 port 56619
2020-03-26 14:11:21
61.90.188.137 attackbotsspam
Mar 26 06:12:45 jane sshd[31662]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.90.188.137 
Mar 26 06:12:47 jane sshd[31662]: Failed password for invalid user federal from 61.90.188.137 port 32578 ssh2
...
2020-03-26 14:03:35
123.58.5.243 attackbotsspam
Invalid user rm from 123.58.5.243 port 44961
2020-03-26 14:08:57
68.127.49.11 attackspambots
Invalid user user from 68.127.49.11 port 46564
2020-03-26 14:06:08
115.238.44.237 attackbots
port scan and connect, tcp 22 (ssh)
2020-03-26 13:48:10

Recently Reported IPs

47.242.109.19 47.241.47.121 47.242.109.201 47.242.105.242
47.241.43.31 47.241.250.179 47.242.111.101 47.242.131.158
47.242.154.65 47.242.133.51 47.242.95.119 47.243.106.64
47.243.113.212 47.242.151.21 47.242.19.6 47.242.184.88
47.242.186.145 47.242.194.41 47.243.162.129 47.243.128.11