Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 90.239.74.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58166
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;90.239.74.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 21:45:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
242.74.239.90.in-addr.arpa domain name pointer host-90-239-74-242.mobileonline.telia.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.74.239.90.in-addr.arpa	name = host-90-239-74-242.mobileonline.telia.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
117.44.121.162 attackspambots
FTP Brute Force
2019-11-19 18:45:47
216.240.6.98 attack
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(11190859)
2019-11-19 18:06:20
220.72.227.233 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=4865)(11190859)
2019-11-19 18:37:28
213.108.18.235 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=56272)(11190859)
2019-11-19 18:38:04
111.61.177.158 attackspambots
[portscan] tcp/21 [FTP]
[scan/connect: 6 time(s)]
in blocklist.de:'listed [ftp]'
*(RWIN=65535)(11190859)
2019-11-19 18:30:07
187.33.161.40 attack
scan z
2019-11-19 18:24:34
35.241.139.136 attackspambots
[portscan] tcp/23 [TELNET]
*(RWIN=65535)(11190859)
2019-11-19 18:35:12
186.224.92.207 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=36177)(11190859)
2019-11-19 18:08:57
177.155.36.203 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=4312)(11190859)
2019-11-19 18:41:57
201.229.156.107 attack
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(11190859)
2019-11-19 18:07:37
177.38.10.98 attackspam
[portscan] tcp/23 [TELNET]
*(RWIN=35186)(11190859)
2019-11-19 18:10:21
117.20.251.9 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=62748)(11190859)
2019-11-19 18:28:24
131.221.250.232 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=2571)(11190859)
2019-11-19 18:11:41
103.214.13.18 attackbots
[portscan] tcp/23 [TELNET]
*(RWIN=19670)(11190859)
2019-11-19 18:31:17
185.254.68.170 attackspambots
185.254.68.170 was recorded 140 times by 5 hosts attempting to connect to the following ports: 8881,7344,5377,9444,3339,2066,5006,8882,7444,6362,9555,6355,5007,2166,2224,8883,7544,9666,6261,2266,6455,2225,5008,8884,7644,6160,9777,9994,6555,5009,2226,8885,7744,7071,4355,6655,9995,5010,2227,8886,7172,7844,4455,6755,4141,5011,7771,6171,7273,4555,6855,7474,5012,7772,7475,4655,8044,6955,9266,5013,7773,8191,4755,7677,8844,9366,7055,7774,5014,1525,7879,5450,9466,7155,8944,5015,7775,2535,7980,5550,9044,9566,7255,5016,7779,4565,8182,5650,7355. Incident counter (4h, 24h, all-time): 140, 622, 4464
2019-11-19 18:41:03

Recently Reported IPs

199.3.190.250 19.81.77.183 64.84.15.178 119.31.50.105
236.200.47.87 255.194.113.68 80.131.118.161 212.63.100.246
248.244.68.179 167.191.154.169 145.217.26.22 189.133.146.86
222.95.181.17 244.15.117.115 86.35.194.192 31.208.185.21
235.76.175.73 66.116.153.148 205.151.233.151 7.239.255.202