Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bogotá

Region: Bogota D.C.

Country: Colombia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 8.242.129.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20685
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;8.242.129.165.			IN	A

;; AUTHORITY SECTION:
.			239	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023040300 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Apr 03 16:22:31 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 165.129.242.8.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 165.129.242.8.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.254.104.139 attack
Unauthorized connection attempt from IP address 14.254.104.139 on Port 445(SMB)
2020-01-02 04:12:42
60.249.117.5 attackspam
firewall-block, port(s): 5555/tcp
2020-01-02 04:33:35
46.101.104.225 attackbots
The IP has triggered Cloudflare WAF. CF-Ray: 54e35ffcfafcdfb7 | WAF_Rule_ID: a75424b44a1e4f27881d03344a122815 | WAF_Kind: firewall | CF_Action: drop | Country: DE | CF_IPClass: noRecord | Protocol: HTTP/1.1 | Method: GET | Host: lab.skk.moe | User-Agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0 | CF_DC: FRA. Report generated by Cloudflare-WAF-to-AbuseIPDB (https://github.com/SukkaW/Cloudflare-WAF-to-AbuseIPDB).
2020-01-02 04:12:14
185.238.44.212 attackspambots
Dec 31 04:26:16 our-server-hostname postfix/smtpd[15026]: connect from unknown[185.238.44.212]
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=185.238.44.212
2020-01-02 04:43:58
178.156.202.93 attack
Jan  1 13:21:33 plesk sshd[22045]: Address 178.156.202.93 maps to slot0.chonleevenom.ml, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jan  1 13:21:33 plesk sshd[22045]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.156.202.93  user=r.r
Jan  1 13:21:35 plesk sshd[22045]: Failed password for r.r from 178.156.202.93 port 42664 ssh2
Jan  1 13:21:35 plesk sshd[22045]: Received disconnect from 178.156.202.93: 11: Bye Bye [preauth]
Jan  1 13:27:51 plesk sshd[22407]: Address 178.156.202.93 maps to mail.textilemarkettrading.cf, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jan  1 13:27:51 plesk sshd[22407]: Invalid user volonte from 178.156.202.93
Jan  1 13:27:51 plesk sshd[22407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.156.202.93 
Jan  1 13:27:52 plesk sshd[22407]: Failed password for invalid user volonte from 178.156.202.93 port ........
-------------------------------
2020-01-02 04:10:38
187.44.43.239 attack
Automatic report - Port Scan Attack
2020-01-02 04:47:41
23.251.128.200 attackbotsspam
Invalid user frihagen from 23.251.128.200 port 33270
2020-01-02 04:46:32
128.199.126.89 attack
invalid user
2020-01-02 04:39:48
51.91.212.81 attackbotsspam
Unauthorized connection attempt detected from IP address 51.91.212.81 to port 8443
2020-01-02 04:10:21
177.87.12.138 attackspam
Autoban   177.87.12.138 AUTH/CONNECT
2020-01-02 04:20:34
134.209.163.236 attackbots
Invalid user lostanlen from 134.209.163.236 port 43740
2020-01-02 04:48:32
197.188.169.192 attackspam
Brute force attempt
2020-01-02 04:23:42
23.92.225.228 attackspam
Jan  1 17:43:47 master sshd[5908]: Failed password for invalid user monitor from 23.92.225.228 port 49730 ssh2
2020-01-02 04:36:07
5.135.198.62 attack
Failed password for root from 5.135.198.62 port 35440 ssh2
2020-01-02 04:42:32
58.144.151.115 attack
Unauthorized Brute Force Email Login Fail
2020-01-02 04:27:02

Recently Reported IPs

211.179.88.62 193.177.173.11 56.68.18.240 55.229.12.0
58.230.63.216 211.146.249.218 85.208.211.215 76.45.73.112
66.175.223.8 131.79.166.237 28.243.106.164 194.187.177.123
209.159.153.66 47.164.25.133 89.246.135.40 84.64.83.130
33.95.172.184 81.17.22.122 207.178.29.50 6.93.154.148