Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.17.40.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3997
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.17.40.242.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023100202 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 03 06:01:33 CST 2023
;; MSG SIZE  rcvd: 105
Host info
Host 242.40.17.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.40.17.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.124.130.239 attack
Port 1433 Scan
2019-10-26 01:39:33
128.199.162.2 attack
Oct 25 02:17:18 php1 sshd\[5922\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2  user=root
Oct 25 02:17:21 php1 sshd\[5922\]: Failed password for root from 128.199.162.2 port 35970 ssh2
Oct 25 02:22:12 php1 sshd\[6286\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.162.2  user=root
Oct 25 02:22:14 php1 sshd\[6286\]: Failed password for root from 128.199.162.2 port 55564 ssh2
Oct 25 02:27:07 php1 sshd\[6693\]: Invalid user 0 from 128.199.162.2
2019-10-26 01:22:52
123.185.3.140 attack
Unauthorized connection attempt from IP address 123.185.3.140 on Port 445(SMB)
2019-10-26 01:44:54
77.79.186.95 attackbots
Unauthorized connection attempt from IP address 77.79.186.95 on Port 445(SMB)
2019-10-26 01:45:31
42.116.68.142 attackspambots
Unauthorized connection attempt from IP address 42.116.68.142 on Port 445(SMB)
2019-10-26 01:34:08
129.28.166.212 attackspam
Tried sshing with brute force.
2019-10-26 01:24:05
87.237.42.71 attackbots
Unauthorized access detected from banned ip
2019-10-26 01:53:06
173.225.101.187 attack
Connection by 173.225.101.187 on port: 25 got caught by honeypot at 10/25/2019 10:21:19 AM
2019-10-26 01:31:35
109.65.8.252 attack
ENG,WP GET /wp-login.php
2019-10-26 01:43:10
213.55.95.149 attack
Unauthorized connection attempt from IP address 213.55.95.149 on Port 445(SMB)
2019-10-26 01:54:03
180.167.134.194 attackspambots
Oct 25 11:10:40 firewall sshd[16441]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.167.134.194  user=root
Oct 25 11:10:42 firewall sshd[16441]: Failed password for root from 180.167.134.194 port 44514 ssh2
Oct 25 11:14:28 firewall sshd[16534]: Invalid user mh from 180.167.134.194
...
2019-10-26 01:37:54
113.88.82.248 attack
Unauthorized connection attempt from IP address 113.88.82.248 on Port 445(SMB)
2019-10-26 01:59:07
89.79.230.63 attack
3389BruteforceStormFW22
2019-10-26 01:59:28
117.254.214.129 attack
Unauthorized connection attempt from IP address 117.254.214.129 on Port 445(SMB)
2019-10-26 01:29:57
120.199.110.172 attackbots
Oct 25 18:40:56 * sshd[26491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.199.110.172
Oct 25 18:40:57 * sshd[26491]: Failed password for invalid user adella from 120.199.110.172 port 44577 ssh2
2019-10-26 01:32:08

Recently Reported IPs

130.153.251.27 120.111.2.215 55.104.254.21 120.31.65.86
62.236.0.216 214.251.201.48 222.34.187.102 250.77.138.114
60.57.158.136 0.82.71.202 44.155.20.109 114.61.6.100
173.74.21.2 73.1.64.193 141.130.54.112 164.26.6.161
100.248.180.30 180.153.13.142 221.199.96.40 85.239.52.141