Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: RTC Communications LLC

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.242.239.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21676
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.242.239.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 12:48:07 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 136.239.242.64.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.239.242.64.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.38.38.221 attackspam
Jul  7 11:19:55 marvibiene sshd[11498]: Invalid user ts3bot from 51.38.38.221 port 46892
Jul  7 11:19:55 marvibiene sshd[11498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.38.221
Jul  7 11:19:55 marvibiene sshd[11498]: Invalid user ts3bot from 51.38.38.221 port 46892
Jul  7 11:19:57 marvibiene sshd[11498]: Failed password for invalid user ts3bot from 51.38.38.221 port 46892 ssh2
...
2019-07-07 19:23:35
111.255.27.164 attackbotsspam
37215/tcp
[2019-07-07]1pkt
2019-07-07 19:09:19
201.27.215.120 attack
8080/tcp
[2019-07-07]1pkt
2019-07-07 19:21:18
5.255.178.105 attackspambots
8080/tcp
[2019-07-07]1pkt
2019-07-07 19:24:56
118.24.8.84 attack
Unauthorized SSH login attempts
2019-07-07 19:19:18
118.166.78.54 attack
37215/tcp
[2019-07-07]1pkt
2019-07-07 19:56:05
189.243.196.79 attackspam
37215/tcp
[2019-07-07]1pkt
2019-07-07 19:05:06
68.183.187.34 attackbots
Jul  7 05:42:01 pornomens sshd\[23503\]: Invalid user caleb from 68.183.187.34 port 34654
Jul  7 05:42:01 pornomens sshd\[23503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.187.34
Jul  7 05:42:03 pornomens sshd\[23503\]: Failed password for invalid user caleb from 68.183.187.34 port 34654 ssh2
...
2019-07-07 19:48:09
208.91.111.98 attackspambots
445/tcp
[2019-07-07]1pkt
2019-07-07 19:34:31
124.134.171.94 attackspambots
22/tcp
[2019-07-07]1pkt
2019-07-07 19:21:58
95.35.27.60 attackbots
23/tcp
[2019-07-07]1pkt
2019-07-07 19:07:35
191.53.221.36 attackbotsspam
SMTP Fraud Orders
2019-07-07 19:44:06
114.43.222.46 attackbots
37215/tcp
[2019-07-07]1pkt
2019-07-07 19:50:49
212.34.61.98 attackbotsspam
[portscan] Port scan
2019-07-07 19:07:05
78.141.192.234 attackspambots
Unauthorised access (Jul  7) SRC=78.141.192.234 LEN=40 TTL=247 ID=16548 TCP DPT=445 WINDOW=1024 SYN
2019-07-07 19:10:55

Recently Reported IPs

37.203.213.184 68.216.249.170 104.49.101.61 173.86.100.112
62.85.230.239 78.61.234.209 220.139.155.41 37.77.53.9
33.7.215.74 155.150.242.184 153.18.108.238 45.216.20.3
79.83.46.216 103.91.154.211 115.140.133.21 14.221.35.44
138.150.171.3 172.157.15.30 69.49.58.252 104.191.74.252