Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.66.167.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1798
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.66.167.242.			IN	A

;; AUTHORITY SECTION:
.			534	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092401 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 25 06:15:09 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 242.167.66.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.167.66.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.180.187.225 attackspam
54.180.187.225 - - [02/Sep/2019:04:23:13 +0100] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (Windows NT 6.1; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.26 Safari/537.36 Core/1.63.4793.400 QQBrowser/10.0.743.400"
2019-09-02 12:04:31
103.26.41.241 attack
Sep  1 17:36:46 sachi sshd\[32554\]: Invalid user kasch from 103.26.41.241
Sep  1 17:36:46 sachi sshd\[32554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.26.41.241
Sep  1 17:36:49 sachi sshd\[32554\]: Failed password for invalid user kasch from 103.26.41.241 port 46736 ssh2
Sep  1 17:41:34 sachi sshd\[572\]: Invalid user hs from 103.26.41.241
Sep  1 17:41:34 sachi sshd\[572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.26.41.241
2019-09-02 11:58:41
111.230.247.243 attackspambots
Sep  2 05:33:44 mail sshd\[24705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.243
Sep  2 05:33:46 mail sshd\[24705\]: Failed password for invalid user paul from 111.230.247.243 port 37243 ssh2
Sep  2 05:38:50 mail sshd\[25416\]: Invalid user cos from 111.230.247.243 port 58503
Sep  2 05:38:50 mail sshd\[25416\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.230.247.243
Sep  2 05:38:52 mail sshd\[25416\]: Failed password for invalid user cos from 111.230.247.243 port 58503 ssh2
2019-09-02 11:53:54
70.82.54.251 attackbotsspam
Sep  1 23:51:15 ny01 sshd[24360]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.82.54.251
Sep  1 23:51:18 ny01 sshd[24360]: Failed password for invalid user jester from 70.82.54.251 port 57744 ssh2
Sep  1 23:55:14 ny01 sshd[25359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=70.82.54.251
2019-09-02 12:06:14
159.192.217.248 attackbotsspam
Sep  2 03:48:39 game-panel sshd[1688]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.192.217.248
Sep  2 03:48:41 game-panel sshd[1688]: Failed password for invalid user free from 159.192.217.248 port 58178 ssh2
Sep  2 03:53:48 game-panel sshd[1893]: Failed password for root from 159.192.217.248 port 48190 ssh2
2019-09-02 11:56:31
140.249.22.238 attack
Sep  2 05:37:06 markkoudstaal sshd[24626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.22.238
Sep  2 05:37:08 markkoudstaal sshd[24626]: Failed password for invalid user eugene from 140.249.22.238 port 44824 ssh2
Sep  2 05:41:45 markkoudstaal sshd[25128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.249.22.238
2019-09-02 11:45:16
103.16.202.90 attackspambots
Automatic report - Banned IP Access
2019-09-02 12:13:15
152.171.234.172 attack
23/tcp 23/tcp 23/tcp
[2019-07-25/09-02]3pkt
2019-09-02 11:55:22
158.69.192.147 attackbotsspam
Sep  2 05:39:12 SilenceServices sshd[18029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.147
Sep  2 05:39:13 SilenceServices sshd[18029]: Failed password for invalid user union from 158.69.192.147 port 42472 ssh2
Sep  2 05:43:03 SilenceServices sshd[19520]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.192.147
2019-09-02 11:51:16
222.186.42.94 attackspam
SSH Brute Force, server-1 sshd[15759]: Failed password for root from 222.186.42.94 port 35112 ssh2
2019-09-02 12:00:23
122.192.51.202 attackbotsspam
Sep  2 03:41:52 hcbbdb sshd\[20068\]: Invalid user listen from 122.192.51.202
Sep  2 03:41:52 hcbbdb sshd\[20068\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.192.51.202
Sep  2 03:41:54 hcbbdb sshd\[20068\]: Failed password for invalid user listen from 122.192.51.202 port 58498 ssh2
Sep  2 03:46:25 hcbbdb sshd\[20559\]: Invalid user fake from 122.192.51.202
Sep  2 03:46:25 hcbbdb sshd\[20559\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.192.51.202
2019-09-02 11:52:07
110.89.139.252 attack
Sep  2 05:09:21 v22019058497090703 sshd[15664]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.89.139.252
Sep  2 05:09:22 v22019058497090703 sshd[15664]: Failed password for invalid user admin from 110.89.139.252 port 54844 ssh2
Sep  2 05:09:25 v22019058497090703 sshd[15664]: Failed password for invalid user admin from 110.89.139.252 port 54844 ssh2
Sep  2 05:09:26 v22019058497090703 sshd[15664]: Failed password for invalid user admin from 110.89.139.252 port 54844 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=110.89.139.252
2019-09-02 11:57:20
91.121.101.61 attackspam
Sep  2 05:35:10 meumeu sshd[13446]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.101.61 
Sep  2 05:35:12 meumeu sshd[13446]: Failed password for invalid user austin from 91.121.101.61 port 34192 ssh2
Sep  2 05:39:12 meumeu sshd[13932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.101.61 
...
2019-09-02 11:44:08
222.252.30.117 attackspambots
Sep  2 00:23:03 ws19vmsma01 sshd[39771]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.252.30.117
Sep  2 00:23:05 ws19vmsma01 sshd[39771]: Failed password for invalid user testuser from 222.252.30.117 port 38888 ssh2
...
2019-09-02 12:16:05
180.178.55.10 attack
Sep  1 17:36:45 php2 sshd\[9236\]: Invalid user le from 180.178.55.10
Sep  1 17:36:45 php2 sshd\[9236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.178.55.10
Sep  1 17:36:47 php2 sshd\[9236\]: Failed password for invalid user le from 180.178.55.10 port 46047 ssh2
Sep  1 17:41:17 php2 sshd\[9821\]: Invalid user commando from 180.178.55.10
Sep  1 17:41:17 php2 sshd\[9821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.178.55.10
Sep  1 17:41:19 php2 sshd\[9821\]: Failed password for invalid user commando from 180.178.55.10 port 42720 ssh2
2019-09-02 11:49:50

Recently Reported IPs

1.67.52.198 1.68.114.88 1.68.124.63 1.66.67.216
1.65.87.239 1.67.123.19 1.67.184.164 1.66.230.228
1.67.162.204 1.66.58.203 1.66.39.223 1.65.94.173
1.67.217.131 1.65.38.37 1.66.180.242 1.65.60.96
1.66.10.14 1.66.153.16 1.67.46.235 1.65.241.46