Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.93.172.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30276
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;11.93.172.242.			IN	A

;; AUTHORITY SECTION:
.			512	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024010601 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 07 03:55:41 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 242.172.93.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.172.93.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.23.78.213 attack
Unauthorized connection attempt from IP address 182.23.78.213 on Port 445(SMB)
2020-03-20 01:08:30
192.119.68.195 attackspam
SpamScore above: 10.0
2020-03-20 00:54:21
222.186.30.35 attackbotsspam
Mar 19 22:45:30 areeb-Workstation sshd[22054]: Failed password for root from 222.186.30.35 port 43028 ssh2
Mar 19 22:45:34 areeb-Workstation sshd[22054]: Failed password for root from 222.186.30.35 port 43028 ssh2
...
2020-03-20 01:17:29
219.129.237.188 attackspam
ET SCAN Suspicious inbound to mySQL port 3306 - port: 3306 proto: TCP cat: Potentially Bad Traffic
2020-03-20 01:14:55
31.134.45.130 attackbots
Unauthorized connection attempt from IP address 31.134.45.130 on Port 445(SMB)
2020-03-20 01:05:56
196.223.154.3 attack
Unauthorized connection attempt from IP address 196.223.154.3 on Port 445(SMB)
2020-03-20 00:53:23
222.186.180.147 attack
SSH-bruteforce attempts
2020-03-20 01:01:00
77.49.109.24 attackbots
Chat Spam
2020-03-20 01:02:44
190.13.145.60 attack
Mar 19 15:21:23 Invalid user teamspeak from 190.13.145.60 port 52556
2020-03-20 01:19:54
188.165.210.176 attackspambots
$f2bV_matches
2020-03-20 01:07:21
222.186.175.167 attackspam
Mar 19 18:18:59 vps647732 sshd[520]: Failed password for root from 222.186.175.167 port 31164 ssh2
Mar 19 18:19:02 vps647732 sshd[520]: Failed password for root from 222.186.175.167 port 31164 ssh2
...
2020-03-20 01:27:34
51.91.156.199 attackspambots
Mar 19 17:50:11 SilenceServices sshd[5002]: Failed password for root from 51.91.156.199 port 55440 ssh2
Mar 19 17:55:39 SilenceServices sshd[12450]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.156.199
Mar 19 17:55:41 SilenceServices sshd[12450]: Failed password for invalid user lucia from 51.91.156.199 port 52858 ssh2
2020-03-20 01:05:03
203.192.204.168 attackspam
Mar 19 14:17:56 haigwepa sshd[18870]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.192.204.168 
Mar 19 14:17:58 haigwepa sshd[18870]: Failed password for invalid user mc from 203.192.204.168 port 46408 ssh2
...
2020-03-20 01:33:31
117.50.107.7 attackspam
Invalid user kensei from 117.50.107.7 port 60018
2020-03-20 01:21:51
111.255.135.232 attack
Unauthorized connection attempt from IP address 111.255.135.232 on Port 445(SMB)
2020-03-20 00:57:54

Recently Reported IPs

11.95.192.20 11.95.122.119 11.93.244.161 11.96.89.144
11.93.162.248 11.94.236.63 11.94.134.167 11.93.50.135
11.95.48.225 11.98.188.222 11.93.183.173 11.94.222.29
11.93.109.75 11.94.139.38 11.93.45.241 11.94.70.210
11.94.12.41 11.93.237.25 11.95.160.66 11.94.44.197