Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.242.159.247
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6619
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.242.159.247.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 19:04:10 CST 2025
;; MSG SIZE  rcvd: 106
Host info
247.159.242.5.in-addr.arpa domain name pointer m5-242-159-247.cust.tele2.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
247.159.242.5.in-addr.arpa	name = m5-242-159-247.cust.tele2.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.88.66.131 attack
Oct 16 14:24:24 hosting sshd[28087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.88.66.131
Oct 16 14:24:24 hosting sshd[28087]: Invalid user goodies from 195.88.66.131 port 35681
Oct 16 14:24:27 hosting sshd[28087]: Failed password for invalid user goodies from 195.88.66.131 port 35681 ssh2
Oct 16 14:43:00 hosting sshd[29438]: Invalid user alohomora from 195.88.66.131 port 47908
...
2019-10-16 20:11:49
46.152.125.174 attackspam
2019/10/16 13:25:01 [error] 1918#1918: *3487 open() "/srv/automx/instance/cgi-bin/ViewLog.asp" failed (2: No such file or directory), client: 46.152.125.174, server: autoconfig.tuxlinux.eu, request: "POST /cgi-bin/ViewLog.asp HTTP/1.1", host: "127.0.0.1"
...
2019-10-16 19:49:03
85.192.71.245 attackbotsspam
Oct 16 01:54:20 hpm sshd\[8327\]: Invalid user zypass from 85.192.71.245
Oct 16 01:54:20 hpm sshd\[8327\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ceip-agustibarbera-amposta.xtec.cat
Oct 16 01:54:22 hpm sshd\[8327\]: Failed password for invalid user zypass from 85.192.71.245 port 40576 ssh2
Oct 16 01:58:40 hpm sshd\[8702\]: Invalid user alcapone from 85.192.71.245
Oct 16 01:58:40 hpm sshd\[8702\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ceip-agustibarbera-amposta.xtec.cat
2019-10-16 19:59:47
157.55.39.137 attack
Automatic report - Banned IP Access
2019-10-16 20:08:39
111.231.143.71 attackspambots
Oct 16 13:22:00 server sshd\[28792\]: Failed password for invalid user dms from 111.231.143.71 port 46704 ssh2
Oct 16 14:22:52 server sshd\[15622\]: Invalid user odroid from 111.231.143.71
Oct 16 14:22:52 server sshd\[15622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.143.71 
Oct 16 14:22:54 server sshd\[15622\]: Failed password for invalid user odroid from 111.231.143.71 port 37252 ssh2
Oct 16 14:25:08 server sshd\[16472\]: Invalid user odroid from 111.231.143.71
Oct 16 14:25:08 server sshd\[16472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.231.143.71 
...
2019-10-16 19:40:55
190.13.129.34 attack
Oct 16 07:57:33 plusreed sshd[8411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.13.129.34  user=root
Oct 16 07:57:36 plusreed sshd[8411]: Failed password for root from 190.13.129.34 port 50288 ssh2
...
2019-10-16 20:10:36
222.186.180.9 attackspam
Oct 16 13:42:51 legacy sshd[12986]: Failed password for root from 222.186.180.9 port 6828 ssh2
Oct 16 13:43:08 legacy sshd[12986]: Failed password for root from 222.186.180.9 port 6828 ssh2
Oct 16 13:43:08 legacy sshd[12986]: error: maximum authentication attempts exceeded for root from 222.186.180.9 port 6828 ssh2 [preauth]
...
2019-10-16 19:43:51
176.31.182.125 attackbotsspam
Oct 16 18:21:27 lcl-usvr-02 sshd[14879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.125  user=root
Oct 16 18:21:29 lcl-usvr-02 sshd[14879]: Failed password for root from 176.31.182.125 port 44103 ssh2
Oct 16 18:24:55 lcl-usvr-02 sshd[15595]: Invalid user waynek from 176.31.182.125 port 35784
Oct 16 18:24:55 lcl-usvr-02 sshd[15595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.125
Oct 16 18:24:55 lcl-usvr-02 sshd[15595]: Invalid user waynek from 176.31.182.125 port 35784
Oct 16 18:24:58 lcl-usvr-02 sshd[15595]: Failed password for invalid user waynek from 176.31.182.125 port 35784 ssh2
...
2019-10-16 19:53:17
192.99.10.122 attackspambots
*Port Scan* detected from 192.99.10.122 (CA/Canada/ns502491.ip-192-99-10.net). 4 hits in the last 156 seconds
2019-10-16 19:47:46
103.232.120.109 attackspambots
Oct 16 13:04:57 microserver sshd[50282]: Invalid user valda from 103.232.120.109 port 37382
Oct 16 13:04:57 microserver sshd[50282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109
Oct 16 13:05:00 microserver sshd[50282]: Failed password for invalid user valda from 103.232.120.109 port 37382 ssh2
Oct 16 13:14:26 microserver sshd[51640]: Invalid user admin from 103.232.120.109 port 43084
Oct 16 13:14:26 microserver sshd[51640]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109
Oct 16 13:29:05 microserver sshd[53692]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.232.120.109  user=root
Oct 16 13:29:08 microserver sshd[53692]: Failed password for root from 103.232.120.109 port 48452 ssh2
Oct 16 13:34:03 microserver sshd[54388]: Invalid user jeffs from 103.232.120.109 port 59654
Oct 16 13:34:03 microserver sshd[54388]: pam_unix(sshd:auth): authentication failu
2019-10-16 19:49:52
58.21.248.123 attackbotsspam
Unauthorised access (Oct 16) SRC=58.21.248.123 LEN=40 TTL=49 ID=53388 TCP DPT=8080 WINDOW=41579 SYN 
Unauthorised access (Oct 16) SRC=58.21.248.123 LEN=40 TTL=49 ID=15650 TCP DPT=8080 WINDOW=38976 SYN
2019-10-16 19:36:55
92.43.104.99 attack
Port 1433 Scan
2019-10-16 20:16:44
211.229.34.218 attackbots
2019-10-16T11:24:28.705151abusebot-5.cloudsearch.cf sshd\[20924\]: Invalid user cforziati from 211.229.34.218 port 44556
2019-10-16 20:08:11
49.235.95.137 attack
Oct 16 01:15:33 auw2 sshd\[31027\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.95.137  user=root
Oct 16 01:15:35 auw2 sshd\[31027\]: Failed password for root from 49.235.95.137 port 58580 ssh2
Oct 16 01:20:13 auw2 sshd\[31411\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.95.137  user=root
Oct 16 01:20:15 auw2 sshd\[31411\]: Failed password for root from 49.235.95.137 port 37666 ssh2
Oct 16 01:25:05 auw2 sshd\[31803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.95.137  user=root
2019-10-16 19:44:44
103.27.207.240 attack
Oct 16 13:21:41 eventyay sshd[19185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.207.240
Oct 16 13:21:43 eventyay sshd[19185]: Failed password for invalid user iFan from 103.27.207.240 port 35274 ssh2
Oct 16 13:26:43 eventyay sshd[19249]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.27.207.240
...
2019-10-16 19:43:12

Recently Reported IPs

4.81.191.237 132.144.33.8 144.46.245.21 216.140.62.84
30.3.105.47 217.237.251.171 191.64.73.202 152.245.246.152
211.196.102.24 52.135.72.61 70.42.190.186 19.60.215.175
207.47.233.110 82.105.13.105 164.97.162.53 189.254.133.161
83.7.103.215 75.44.54.243 120.225.3.24 25.81.163.88