Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Khon Sawan

Region: Chaiyaphum

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.1.242.100 attack
Unauthorized connection attempt from IP address 1.1.242.100 on Port 445(SMB)
2020-07-08 13:35:35
1.1.242.100 attackspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-06-26 08:42:44
1.1.242.43 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 12-03-2020 03:50:08.
2020-03-12 17:03:35
1.1.242.89 attackspambots
port scan/probe/communication attempt; port 23
2019-11-24 07:09:49
1.1.242.11 attack
Unauthorized connection attempt from IP address 1.1.242.11 on Port 445(SMB)
2019-08-28 00:26:49
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.1.242.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60710
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.1.242.80.			IN	A

;; AUTHORITY SECTION:
.			267	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 09:28:16 CST 2022
;; MSG SIZE  rcvd: 103
Host info
80.242.1.1.in-addr.arpa domain name pointer node-mkw.pool-1-1.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.242.1.1.in-addr.arpa	name = node-mkw.pool-1-1.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.76.236.200 attackspam
$f2bV_matches
2019-12-27 01:32:49
201.183.225.59 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-27 01:37:16
159.89.88.74 attack
DigitalOcean BotNet attack - 10s of requests to non-existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
node-superagent/4.1.0
2019-12-27 01:53:49
201.46.157.213 attackspam
201.46.157.213 has been banned for [spam]
...
2019-12-27 01:56:51
162.209.239.45 attack
$f2bV_matches
2019-12-27 01:46:31
180.96.12.158 attackspam
$f2bV_matches
2019-12-27 01:32:33
201.236.160.142 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-27 01:33:46
168.62.7.25 attack
$f2bV_matches
2019-12-27 01:45:55
157.245.80.51 attackbots
$f2bV_matches
2019-12-27 01:49:38
182.254.167.234 attack
$f2bV_matches
2019-12-27 01:29:51
202.229.120.90 attackbots
Automatic report - Banned IP Access
2019-12-27 01:33:22
217.160.44.145 attackspam
Dec 26 16:43:58 legacy sshd[17567]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.44.145
Dec 26 16:44:00 legacy sshd[17567]: Failed password for invalid user koblitz from 217.160.44.145 port 37240 ssh2
Dec 26 16:46:45 legacy sshd[17599]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.160.44.145
...
2019-12-27 01:31:07
173.212.231.218 attackspam
$f2bV_matches
2019-12-27 01:42:38
184.154.74.66 attackbotsspam
Automatic report - Banned IP Access
2019-12-27 01:58:17
167.71.245.52 attackbotsspam
DigitalOcean BotNet attack - 10s of requests to non-existent pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
node-superagent/4.1.0
2019-12-27 01:35:43

Recently Reported IPs

1.10.238.178 1.12.232.205 1.116.30.184 1.10.219.159
1.117.205.175 1.10.170.122 1.11.107.64 1.124.111.218
1.119.8.66 1.124.109.98 1.13.16.32 1.13.174.126
1.14.100.192 1.14.191.125 1.14.103.58 1.136.105.248
1.14.34.199 1.14.94.46 1.14.65.202 1.146.69.88