Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 71.64.96.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34447
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;71.64.96.242.			IN	A

;; AUTHORITY SECTION:
.			258	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 07:57:30 CST 2023
;; MSG SIZE  rcvd: 105
Host info
242.96.64.71.in-addr.arpa domain name pointer cpe-71-64-96-242.neo.res.rr.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.96.64.71.in-addr.arpa	name = cpe-71-64-96-242.neo.res.rr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.15.159.18 attackspam
Automatic report - Port Scan Attack
2019-10-15 15:19:19
39.82.34.24 attackspam
Automatic report - Banned IP Access
2019-10-15 15:30:52
45.9.123.247 attackspam
[Aegis] @ 2019-10-15 04:50:04  0100 -> A web attack returned code 200 (success).
2019-10-15 15:08:24
202.137.17.146 attackbots
Scanning and Vuln Attempts
2019-10-15 15:11:34
202.53.139.150 attack
Scanning and Vuln Attempts
2019-10-15 15:04:32
200.24.238.107 attack
Scanning and Vuln Attempts
2019-10-15 15:24:06
51.75.247.13 attackbots
$f2bV_matches
2019-10-15 15:22:16
81.22.45.73 attack
2019-10-15T06:34:37.271296+02:00 lumpi kernel: [936487.697952] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.73 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=30277 PROTO=TCP SPT=57637 DPT=390 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-15 15:22:48
52.37.77.98 attack
10/15/2019-08:56:13.262699 52.37.77.98 Protocol: 6 SURICATA TLS invalid record/traffic
2019-10-15 15:08:00
186.139.59.45 attackbotsspam
Fail2Ban Ban Triggered
SMTP Abuse Attempt
2019-10-15 15:34:46
140.143.4.188 attackbotsspam
Oct 15 09:31:28 ns381471 sshd[28424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.4.188
Oct 15 09:31:30 ns381471 sshd[28424]: Failed password for invalid user 123com from 140.143.4.188 port 41228 ssh2
Oct 15 09:37:04 ns381471 sshd[28607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.4.188
2019-10-15 15:37:16
2.59.21.207 attack
[Aegis] @ 2019-10-15 04:50:08  0100 -> A web attack returned code 200 (success).
2019-10-15 15:07:21
87.118.112.63 attackbots
www.familiengesundheitszentrum-fulda.de 87.118.112.63 \[15/Oct/2019:05:50:05 +0200\] "POST /xmlrpc.php HTTP/1.0" 301 537 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_10_5\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/68.0.3440.106 Safari/537.36"
familiengesundheitszentrum-fulda.de 87.118.112.63 \[15/Oct/2019:05:50:08 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 3777 "-" "Mozilla/5.0 \(Macintosh\; Intel Mac OS X 10_10_5\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/68.0.3440.106 Safari/537.36"
2019-10-15 15:11:07
134.175.205.46 attack
$f2bV_matches
2019-10-15 15:40:23
187.148.4.135 attackspambots
Automatic report - Port Scan Attack
2019-10-15 15:15:32

Recently Reported IPs

77.24.227.227 111.66.153.40 190.85.43.158 206.186.157.243
82.172.117.6 13.112.243.168 105.232.93.230 90.109.80.128
11.110.0.81 177.82.3.20 103.97.100.150 9.43.245.27
72.161.108.105 85.96.187.95 216.169.236.39 129.227.135.36
106.217.108.32 175.205.93.181 237.175.143.101 196.0.2.253