Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.157.59.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45983
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;51.157.59.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:32:06 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 242.59.157.51.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.59.157.51.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
109.111.231.158 attackbotsspam
Attempted Brute Force (dovecot)
2020-09-04 02:38:37
45.142.120.93 attack
2020-09-03T12:23:20.412288linuxbox-skyline auth[55307]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=almoxarifado rhost=45.142.120.93
...
2020-09-04 02:27:16
23.129.64.192 attackbots
Automatic report - Banned IP Access
2020-09-04 02:17:51
189.213.101.238 attackbots
20/9/2@12:42:17: FAIL: Alarm-Telnet address from=189.213.101.238
...
2020-09-04 02:35:05
174.240.13.175 attack
Brute forcing email accounts
2020-09-04 02:35:56
177.98.167.139 attack
SMB Server BruteForce Attack
2020-09-04 02:26:06
167.71.232.211 attackspam
$f2bV_matches
2020-09-04 02:28:07
5.188.84.119 attack
0,31-01/02 [bc01/m14] PostRequest-Spammer scoring: paris
2020-09-04 02:45:31
192.144.204.6 attack
2020-09-03T17:02:11.024742vps773228.ovh.net sshd[32594]: Failed password for invalid user martina from 192.144.204.6 port 43774 ssh2
2020-09-03T17:06:22.971490vps773228.ovh.net sshd[32636]: Invalid user ventas from 192.144.204.6 port 54816
2020-09-03T17:06:22.987842vps773228.ovh.net sshd[32636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.204.6
2020-09-03T17:06:22.971490vps773228.ovh.net sshd[32636]: Invalid user ventas from 192.144.204.6 port 54816
2020-09-03T17:06:24.602341vps773228.ovh.net sshd[32636]: Failed password for invalid user ventas from 192.144.204.6 port 54816 ssh2
...
2020-09-04 02:37:39
192.42.116.25 attackbots
Sep  3 19:38:41 vmd26974 sshd[8963]: Failed password for root from 192.42.116.25 port 48040 ssh2
Sep  3 19:38:44 vmd26974 sshd[8963]: Failed password for root from 192.42.116.25 port 48040 ssh2
...
2020-09-04 02:38:51
192.35.169.26 attackspambots
 TCP (SYN) 192.35.169.26:38089 -> port 81, len 44
2020-09-04 02:41:00
200.150.77.93 attack
$f2bV_matches
2020-09-04 02:38:15
106.54.94.252 attackbotsspam
Sep  3 13:46:12 *** sshd[20130]: User root from 106.54.94.252 not allowed because not listed in AllowUsers
2020-09-04 02:12:49
207.180.220.114 attackspam
20 attempts against mh-misbehave-ban on leaf
2020-09-04 02:13:46
187.19.10.220 attack
SMTP brute force attempt
2020-09-04 02:42:22

Recently Reported IPs

97.47.235.239 79.238.38.148 88.202.138.208 79.85.4.249
34.223.222.196 88.97.89.21 193.70.212.210 220.0.172.133
126.9.152.238 114.116.165.235 180.176.19.77 2.102.208.184
55.211.135.110 186.26.217.91 7.91.179.41 212.140.104.50
36.176.148.109 198.15.27.127 155.19.236.53 52.141.196.8