Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.242.39.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62341
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;51.242.39.105.			IN	A

;; AUTHORITY SECTION:
.			424	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102900 1800 900 604800 86400

;; Query time: 608 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 29 17:21:02 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 105.39.242.51.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 105.39.242.51.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
179.99.203.139 attack
Oct  9 02:14:26 vps sshd[1076]: Failed password for root from 179.99.203.139 port 26173 ssh2
Oct  9 02:14:52 vps sshd[1111]: Failed password for root from 179.99.203.139 port 59645 ssh2
...
2020-10-09 12:45:38
49.88.112.73 attack
Oct  9 09:53:57 dhoomketu sshd[3684954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.73  user=root
Oct  9 09:54:00 dhoomketu sshd[3684954]: Failed password for root from 49.88.112.73 port 46631 ssh2
Oct  9 09:53:57 dhoomketu sshd[3684954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.73  user=root
Oct  9 09:54:00 dhoomketu sshd[3684954]: Failed password for root from 49.88.112.73 port 46631 ssh2
Oct  9 09:54:02 dhoomketu sshd[3684954]: Failed password for root from 49.88.112.73 port 46631 ssh2
...
2020-10-09 12:24:41
165.169.15.242 attackbotsspam
Attempting admin logins
2020-10-09 12:49:36
166.252.236.146 attackspam
Oct  8 22:48:19 ns382633 sshd\[18815\]: Invalid user admin from 166.252.236.146 port 6127
Oct  8 22:48:19 ns382633 sshd\[18815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.252.236.146
Oct  8 22:48:21 ns382633 sshd\[18815\]: Failed password for invalid user admin from 166.252.236.146 port 6127 ssh2
Oct  8 22:48:24 ns382633 sshd\[18818\]: Invalid user admin from 166.252.236.146 port 50036
Oct  8 22:48:25 ns382633 sshd\[18818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.252.236.146
2020-10-09 12:49:04
203.137.119.217 attack
Oct  9 04:06:16 inter-technics sshd[3272]: Invalid user root0 from 203.137.119.217 port 48280
Oct  9 04:06:16 inter-technics sshd[3272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.137.119.217
Oct  9 04:06:16 inter-technics sshd[3272]: Invalid user root0 from 203.137.119.217 port 48280
Oct  9 04:06:18 inter-technics sshd[3272]: Failed password for invalid user root0 from 203.137.119.217 port 48280 ssh2
Oct  9 04:07:47 inter-technics sshd[3348]: Invalid user linux1 from 203.137.119.217 port 37852
...
2020-10-09 13:06:44
116.1.180.22 attackspambots
Oct  9 04:40:42 santamaria sshd\[10570\]: Invalid user nagios from 116.1.180.22
Oct  9 04:40:42 santamaria sshd\[10570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.1.180.22
Oct  9 04:40:44 santamaria sshd\[10570\]: Failed password for invalid user nagios from 116.1.180.22 port 35552 ssh2
...
2020-10-09 12:50:07
37.47.33.5 attack
Brute Force attack - banned by Fail2Ban
2020-10-09 12:40:56
23.250.1.144 attackspambots
Automatic report - Banned IP Access
2020-10-09 12:24:08
103.18.72.54 attackspambots
20/10/8@17:20:55: FAIL: Alarm-Network address from=103.18.72.54
...
2020-10-09 12:30:35
120.31.138.79 attackspam
$f2bV_matches
2020-10-09 12:32:17
141.98.81.197 attackbots
" "
2020-10-09 12:36:12
51.161.45.174 attackbotsspam
Oct  9 02:50:07 markkoudstaal sshd[12852]: Failed password for root from 51.161.45.174 port 45918 ssh2
Oct  9 02:52:58 markkoudstaal sshd[13572]: Failed password for root from 51.161.45.174 port 40528 ssh2
...
2020-10-09 12:55:15
218.92.0.246 attackspam
Oct  9 06:25:07 santamaria sshd\[12144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Oct  9 06:25:08 santamaria sshd\[12144\]: Failed password for root from 218.92.0.246 port 22718 ssh2
Oct  9 06:25:26 santamaria sshd\[12146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
...
2020-10-09 12:29:30
46.21.209.140 attack
Autoban   46.21.209.140 AUTH/CONNECT
2020-10-09 12:28:42
103.21.116.249 attackspam
Oct  9 10:30:08 mx sshd[1281988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.116.249  user=root
Oct  9 10:30:09 mx sshd[1281988]: Failed password for root from 103.21.116.249 port 60416 ssh2
Oct  9 10:31:20 mx sshd[1282021]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.21.116.249  user=root
Oct  9 10:31:22 mx sshd[1282021]: Failed password for root from 103.21.116.249 port 47632 ssh2
Oct  9 10:32:28 mx sshd[1282046]: Invalid user test2001 from 103.21.116.249 port 34734
...
2020-10-09 13:03:10

Recently Reported IPs

118.254.13.86 86.36.62.88 30.156.173.248 37.238.184.126
45.102.230.63 190.177.152.167 10.125.122.176 162.15.7.73
19.210.113.12 154.138.7.158 173.202.112.225 225.102.229.149
105.120.78.37 101.12.115.129 96.92.175.112 237.12.130.217
150.71.131.123 141.238.91.216 213.118.139.42 234.6.160.17