Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Tanzania, the United Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.84.242.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.84.242.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 20:46:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 48.242.84.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.242.84.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
24.220.27.158 attackbots
Jun 29 21:59:23 www1 sshd\[40731\]: Invalid user admin from 24.220.27.158Jun 29 21:59:25 www1 sshd\[40731\]: Failed password for invalid user admin from 24.220.27.158 port 50449 ssh2Jun 29 21:59:29 www1 sshd\[40736\]: Failed password for root from 24.220.27.158 port 50592 ssh2Jun 29 21:59:31 www1 sshd\[40738\]: Invalid user admin from 24.220.27.158Jun 29 21:59:33 www1 sshd\[40738\]: Failed password for invalid user admin from 24.220.27.158 port 50700 ssh2Jun 29 21:59:34 www1 sshd\[40740\]: Invalid user admin from 24.220.27.158
...
2020-06-30 03:50:06
222.186.175.151 attack
detected by Fail2Ban
2020-06-30 03:59:40
92.217.117.43 attackspam
[29/Jun/2020 x@x
[29/Jun/2020 x@x
[29/Jun/2020 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=92.217.117.43
2020-06-30 03:32:00
141.98.81.42 attack
Attempted to connect 4 times to port 22 TCP
2020-06-30 04:02:01
120.131.13.186 attackbots
SSH Brute-Force attacks
2020-06-30 03:51:10
152.231.108.170 attack
Jun 29 19:47:40 sxvn sshd[49619]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.231.108.170
2020-06-30 03:46:39
222.186.42.137 attack
Jun 29 20:49:59 rocket sshd[9470]: Failed password for root from 222.186.42.137 port 56703 ssh2
Jun 29 20:50:02 rocket sshd[9470]: Failed password for root from 222.186.42.137 port 56703 ssh2
Jun 29 20:50:04 rocket sshd[9470]: Failed password for root from 222.186.42.137 port 56703 ssh2
...
2020-06-30 03:52:12
141.98.81.207 attack
Jun 29 16:49:34 firewall sshd[14174]: Invalid user admin from 141.98.81.207
Jun 29 16:49:36 firewall sshd[14174]: Failed password for invalid user admin from 141.98.81.207 port 14957 ssh2
Jun 29 16:50:00 firewall sshd[14186]: Invalid user Admin from 141.98.81.207
...
2020-06-30 03:59:55
188.166.61.76 attack
Jun 29 15:46:28 NPSTNNYC01T sshd[20906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.61.76
Jun 29 15:46:29 NPSTNNYC01T sshd[20906]: Failed password for invalid user ubnt from 188.166.61.76 port 33056 ssh2
Jun 29 15:50:01 NPSTNNYC01T sshd[21142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.61.76
...
2020-06-30 03:56:41
111.93.41.206 attack
Unauthorized connection attempt: SRC=111.93.41.206
...
2020-06-30 03:48:31
194.126.143.132 attackbotsspam
...
2020-06-30 03:43:46
51.178.182.35 attackspambots
Jun 29 12:20:07 NPSTNNYC01T sshd[4422]: Failed password for root from 51.178.182.35 port 48514 ssh2
Jun 29 12:23:15 NPSTNNYC01T sshd[4582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.182.35
Jun 29 12:23:17 NPSTNNYC01T sshd[4582]: Failed password for invalid user adsl from 51.178.182.35 port 47192 ssh2
...
2020-06-30 03:25:39
112.85.42.89 attack
Jun 29 22:33:23 ift sshd\[14706\]: Failed password for root from 112.85.42.89 port 64829 ssh2Jun 29 22:33:25 ift sshd\[14706\]: Failed password for root from 112.85.42.89 port 64829 ssh2Jun 29 22:33:27 ift sshd\[14706\]: Failed password for root from 112.85.42.89 port 64829 ssh2Jun 29 22:34:17 ift sshd\[14825\]: Failed password for root from 112.85.42.89 port 44377 ssh2Jun 29 22:35:21 ift sshd\[15135\]: Failed password for root from 112.85.42.89 port 14570 ssh2
...
2020-06-30 03:39:56
217.165.165.154 attack
Jun 29 13:06:10 hell sshd[22873]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.165.165.154
Jun 29 13:06:13 hell sshd[22873]: Failed password for invalid user tit0nich from 217.165.165.154 port 50172 ssh2
...
2020-06-30 03:38:49
90.199.130.186 attack
29-6-2020 12:54:12	Unauthorized connection attempt (Brute-Force).
29-6-2020 12:54:12	Connection from IP address: 90.199.130.186 on port: 587


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=90.199.130.186
2020-06-30 03:38:29

Recently Reported IPs

2.85.108.140 69.105.246.46 92.146.75.128 175.231.132.22
27.68.220.230 103.173.137.238 24.162.73.231 88.124.115.87
204.33.59.133 241.107.212.54 252.164.201.100 197.139.200.135
23.120.137.252 157.70.105.164 92.223.23.48 121.185.77.85
61.138.170.87 159.182.117.245 126.28.167.18 201.8.118.28