Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
51.75.242.129 attackspambots
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-08 01:13:22
51.75.242.129 attack
Port scan denied
2020-09-07 16:38:34
51.75.242.129 attackspambots
ET CINS Active Threat Intelligence Poor Reputation IP group 37 - port: 32173 proto: tcp cat: Misc Attackbytes: 60
2020-08-26 06:41:50
51.75.242.129 attack
 TCP (SYN) 51.75.242.129:51529 -> port 22036, len 44
2020-08-04 20:09:21
51.75.242.129 attackspambots
Port scan: Attack repeated for 24 hours
2020-08-02 08:40:35
51.75.242.129 attackbots
Jul 23 14:53:13 debian-2gb-nbg1-2 kernel: \[17767318.278266\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=51.75.242.129 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=18071 PROTO=TCP SPT=41212 DPT=6052 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-23 22:29:28
51.75.242.105 attackspambots
SIP-5060-Unauthorized
2020-04-18 14:26:40
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 51.75.242.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59142
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;51.75.242.196.			IN	A

;; AUTHORITY SECTION:
.			108	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100201 1800 900 604800 86400

;; Query time: 147 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 03 04:04:19 CST 2023
;; MSG SIZE  rcvd: 106
Host info
196.242.75.51.in-addr.arpa domain name pointer ns3129097.ip-51-75-242.eu.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
196.242.75.51.in-addr.arpa	name = ns3129097.ip-51-75-242.eu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.42.74.114 attack
Unauthorized connection attempt detected from IP address 77.42.74.114 to port 2323
2020-01-06 03:01:57
190.186.84.72 attack
Unauthorized connection attempt detected from IP address 190.186.84.72 to port 23
2020-01-06 02:44:20
24.30.7.110 attackspambots
Unauthorized connection attempt detected from IP address 24.30.7.110 to port 81 [J]
2020-01-06 03:07:04
59.13.78.186 attackspam
Unauthorized connection attempt detected from IP address 59.13.78.186 to port 23
2020-01-06 03:03:40
221.133.0.27 attackspam
Unauthorized connection attempt detected from IP address 221.133.0.27 to port 1433 [J]
2020-01-06 03:08:42
85.104.111.9 attack
Unauthorized connection attempt detected from IP address 85.104.111.9 to port 81 [J]
2020-01-06 02:58:20
102.40.48.96 attack
Unauthorized connection attempt detected from IP address 102.40.48.96 to port 23
2020-01-06 02:54:58
200.194.38.89 attackbotsspam
Unauthorized connection attempt detected from IP address 200.194.38.89 to port 23
2020-01-06 03:10:48
104.187.32.146 attackspambots
Unauthorized connection attempt detected from IP address 104.187.32.146 to port 23 [J]
2020-01-06 02:54:30
90.229.230.72 attackbots
Unauthorized connection attempt detected from IP address 90.229.230.72 to port 5555
2020-01-06 02:58:00
186.5.178.20 attackspambots
Unauthorized connection attempt detected from IP address 186.5.178.20 to port 8081 [J]
2020-01-06 02:45:56
223.71.167.164 attack
Jan  5 18:57:13 h2177944 kernel: \[1445604.043935\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=223.71.167.164 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=113 ID=47902 PROTO=TCP SPT=39789 DPT=9100 WINDOW=29200 RES=0x00 SYN URGP=0 
Jan  5 18:57:13 h2177944 kernel: \[1445604.043950\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=223.71.167.164 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=113 ID=47902 PROTO=TCP SPT=39789 DPT=9100 WINDOW=29200 RES=0x00 SYN URGP=0 
Jan  5 19:15:20 h2177944 kernel: \[1446691.107211\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=223.71.167.164 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=115 ID=14569 PROTO=TCP SPT=41265 DPT=9295 WINDOW=29200 RES=0x00 SYN URGP=0 
Jan  5 19:15:20 h2177944 kernel: \[1446691.107227\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=223.71.167.164 DST=85.214.117.9 LEN=44 TOS=0x00 PREC=0x00 TTL=115 ID=14569 PROTO=TCP SPT=41265 DPT=9295 WINDOW=29200 RES=0x00 SYN URGP=0 
Jan  5 19:48:36 h2177944 kernel: \[1448686.969818\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=223.71.167.164 DST=85.
2020-01-06 03:08:01
191.255.39.34 attackbots
Unauthorized connection attempt detected from IP address 191.255.39.34 to port 23
2020-01-06 03:13:09
191.255.240.23 attack
Unauthorized connection attempt detected from IP address 191.255.240.23 to port 445
2020-01-06 02:43:50
185.156.177.22 attackbotsspam
Unauthorized connection attempt detected from IP address 185.156.177.22 to port 3389
2020-01-06 02:46:18

Recently Reported IPs

56.161.122.120 185.178.208.234 6.222.229.246 87.31.82.57
96.90.24.137 96.57.110.228 67.160.178.149 19.191.98.23
249.154.152.50 32.170.40.33 27.253.69.83 155.174.76.88
23.116.16.117 116.95.140.202 240.123.173.218 115.1.89.19
25.173.181.5 147.12.21.142 142.174.165.219 33.191.31.211