Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.242.213.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48569
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.242.213.218.			IN	A

;; AUTHORITY SECTION:
.			357	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 04:52:23 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 218.213.242.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 218.213.242.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.246 attack
Oct 12 15:31:34 localhost sshd[121551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Oct 12 15:31:35 localhost sshd[121551]: Failed password for root from 218.92.0.246 port 62220 ssh2
Oct 12 15:31:38 localhost sshd[121551]: Failed password for root from 218.92.0.246 port 62220 ssh2
Oct 12 15:31:34 localhost sshd[121551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Oct 12 15:31:35 localhost sshd[121551]: Failed password for root from 218.92.0.246 port 62220 ssh2
Oct 12 15:31:38 localhost sshd[121551]: Failed password for root from 218.92.0.246 port 62220 ssh2
Oct 12 15:31:34 localhost sshd[121551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Oct 12 15:31:35 localhost sshd[121551]: Failed password for root from 218.92.0.246 port 62220 ssh2
Oct 12 15:31:38 localhost sshd[121551]: Failed pa
...
2020-10-12 23:55:33
144.91.83.122 attackspam
Oct 12 14:30:23 *hidden* sshd[3816]: Invalid user o2 from 144.91.83.122 port 46558 Oct 12 14:30:23 *hidden* sshd[3816]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.91.83.122 Oct 12 14:30:25 *hidden* sshd[3816]: Failed password for invalid user o2 from 144.91.83.122 port 46558 ssh2
2020-10-12 23:09:25
112.85.42.231 attack
Oct 12 17:20:39 abendstille sshd\[20965\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.231  user=root
Oct 12 17:20:41 abendstille sshd\[20965\]: Failed password for root from 112.85.42.231 port 18292 ssh2
Oct 12 17:20:44 abendstille sshd\[20965\]: Failed password for root from 112.85.42.231 port 18292 ssh2
Oct 12 17:20:47 abendstille sshd\[20965\]: Failed password for root from 112.85.42.231 port 18292 ssh2
Oct 12 17:20:51 abendstille sshd\[20965\]: Failed password for root from 112.85.42.231 port 18292 ssh2
...
2020-10-12 23:27:53
112.85.42.183 attackspam
Oct 12 15:32:24 rush sshd[28609]: Failed password for root from 112.85.42.183 port 50670 ssh2
Oct 12 15:32:27 rush sshd[28609]: Failed password for root from 112.85.42.183 port 50670 ssh2
Oct 12 15:32:31 rush sshd[28609]: Failed password for root from 112.85.42.183 port 50670 ssh2
Oct 12 15:32:34 rush sshd[28609]: Failed password for root from 112.85.42.183 port 50670 ssh2
...
2020-10-12 23:35:42
139.199.32.22 attackspam
SSH Bruteforce Attempt on Honeypot
2020-10-12 23:33:50
45.181.228.1 attack
2020-10-12T16:18:23.779563vps773228.ovh.net sshd[18205]: Failed password for invalid user mark from 45.181.228.1 port 24296 ssh2
2020-10-12T16:22:56.677926vps773228.ovh.net sshd[18251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.181.228.1  user=root
2020-10-12T16:22:58.261178vps773228.ovh.net sshd[18251]: Failed password for root from 45.181.228.1 port 24819 ssh2
2020-10-12T16:27:32.612153vps773228.ovh.net sshd[18291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.181.228.1  user=root
2020-10-12T16:27:34.752139vps773228.ovh.net sshd[18291]: Failed password for root from 45.181.228.1 port 22286 ssh2
...
2020-10-12 23:53:52
212.122.94.219 attackbotsspam
TCP port : 5900
2020-10-12 23:45:31
37.239.16.26 attackbotsspam
37.239.16.26 - - [11/Oct/2020:21:47:29 +0100] "POST /wp-login.php HTTP/1.1" 200 2405 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.239.16.26 - - [11/Oct/2020:21:47:39 +0100] "POST /wp-login.php HTTP/1.1" 200 2404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.239.16.26 - - [11/Oct/2020:21:47:59 +0100] "POST /wp-login.php HTTP/1.1" 200 2413 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-12 23:25:29
125.124.215.222 attackspam
SSH login attempts.
2020-10-12 23:39:17
159.203.63.125 attack
Oct 12 15:27:12 host sshd[22980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.63.125  user=root
Oct 12 15:27:14 host sshd[22980]: Failed password for root from 159.203.63.125 port 54291 ssh2
...
2020-10-12 23:31:15
97.64.122.66 attackspambots
Invalid user git from 97.64.122.66 port 35186
2020-10-12 23:16:10
5.165.209.96 attackbotsspam
Oct 12 17:29:45 PorscheCustomer sshd[26514]: Failed password for root from 5.165.209.96 port 36016 ssh2
Oct 12 17:31:44 PorscheCustomer sshd[26601]: Failed password for root from 5.165.209.96 port 39770 ssh2
...
2020-10-12 23:48:16
61.177.172.89 attackbots
Oct 12 17:17:27 db sshd[4955]: User root from 61.177.172.89 not allowed because none of user's groups are listed in AllowGroups
...
2020-10-12 23:21:18
106.13.226.170 attack
Oct 12 07:08:28 pve1 sshd[21942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.226.170 
Oct 12 07:08:30 pve1 sshd[21942]: Failed password for invalid user lukasz from 106.13.226.170 port 54428 ssh2
...
2020-10-12 23:32:07
61.177.172.54 attack
Repeated brute force against a port
2020-10-12 23:41:21

Recently Reported IPs

11.244.229.243 11.241.99.253 11.242.223.41 11.241.92.241
11.244.224.75 11.242.185.191 11.243.234.44 11.241.6.225
11.242.124.47 11.242.138.128 11.245.78.237 11.248.49.98
11.244.10.92 11.242.136.102 11.242.144.176 11.242.244.83
11.243.143.205 11.242.252.229 11.241.33.14 11.241.68.234