Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: AT&T Internet Services

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspambots
Oct 11 18:55:12 firewall sshd[27398]: Failed password for invalid user casillas from 12.244.146.242 port 57137 ssh2
Oct 11 18:59:32 firewall sshd[27555]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.244.146.242  user=root
Oct 11 18:59:34 firewall sshd[27555]: Failed password for root from 12.244.146.242 port 6569 ssh2
...
2020-10-12 06:50:34
attackspambots
$f2bV_matches
2020-10-11 23:00:08
attackspam
prod8
...
2020-10-11 14:57:17
attackbotsspam
Oct 10 16:27:41 pixelmemory sshd[3936257]: Invalid user uupc from 12.244.146.242 port 36480
Oct 10 16:27:41 pixelmemory sshd[3936257]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=12.244.146.242 
Oct 10 16:27:41 pixelmemory sshd[3936257]: Invalid user uupc from 12.244.146.242 port 36480
Oct 10 16:27:43 pixelmemory sshd[3936257]: Failed password for invalid user uupc from 12.244.146.242 port 36480 ssh2
Oct 10 16:31:17 pixelmemory sshd[3958042]: Invalid user cara from 12.244.146.242 port 10711
...
2020-10-11 08:19:36
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.244.146.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26609
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.244.146.242.			IN	A

;; AUTHORITY SECTION:
.			328	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020101002 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 11 08:19:32 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 242.146.244.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.146.244.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.187.78.170 attack
Jul 10 21:03:08 MainVPS sshd[23582]: Invalid user katrina from 37.187.78.170 port 44037
Jul 10 21:03:08 MainVPS sshd[23582]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.78.170
Jul 10 21:03:08 MainVPS sshd[23582]: Invalid user katrina from 37.187.78.170 port 44037
Jul 10 21:03:10 MainVPS sshd[23582]: Failed password for invalid user katrina from 37.187.78.170 port 44037 ssh2
Jul 10 21:05:55 MainVPS sshd[23874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.78.170  user=root
Jul 10 21:05:57 MainVPS sshd[23874]: Failed password for root from 37.187.78.170 port 61088 ssh2
...
2019-07-11 05:49:13
130.162.74.85 attackbotsspam
Jul 10 21:03:22 mail sshd\[18467\]: Invalid user sahil from 130.162.74.85\
Jul 10 21:03:24 mail sshd\[18467\]: Failed password for invalid user sahil from 130.162.74.85 port 31178 ssh2\
Jul 10 21:04:56 mail sshd\[18472\]: Invalid user apps from 130.162.74.85\
Jul 10 21:04:58 mail sshd\[18472\]: Failed password for invalid user apps from 130.162.74.85 port 39729 ssh2\
Jul 10 21:06:23 mail sshd\[18494\]: Invalid user amolah from 130.162.74.85\
Jul 10 21:06:26 mail sshd\[18494\]: Failed password for invalid user amolah from 130.162.74.85 port 47783 ssh2\
2019-07-11 05:30:09
206.189.202.165 attackbotsspam
Jul 10 22:52:57 dev sshd\[3404\]: Invalid user tsbot from 206.189.202.165 port 40200
Jul 10 22:52:57 dev sshd\[3404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.202.165
...
2019-07-11 05:40:32
106.12.78.161 attackbots
Jul 10 23:03:24 Proxmox sshd\[11189\]: Invalid user andreia from 106.12.78.161 port 58180
Jul 10 23:03:24 Proxmox sshd\[11189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.161
Jul 10 23:03:26 Proxmox sshd\[11189\]: Failed password for invalid user andreia from 106.12.78.161 port 58180 ssh2
Jul 10 23:06:50 Proxmox sshd\[14863\]: Invalid user tom1 from 106.12.78.161 port 35528
Jul 10 23:06:50 Proxmox sshd\[14863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.78.161
Jul 10 23:06:52 Proxmox sshd\[14863\]: Failed password for invalid user tom1 from 106.12.78.161 port 35528 ssh2
2019-07-11 06:07:12
159.65.34.82 attackspam
2019-07-10T23:27:23.132607cavecanem sshd[7715]: Invalid user co from 159.65.34.82 port 54772
2019-07-10T23:27:23.135029cavecanem sshd[7715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.34.82
2019-07-10T23:27:23.132607cavecanem sshd[7715]: Invalid user co from 159.65.34.82 port 54772
2019-07-10T23:27:25.569321cavecanem sshd[7715]: Failed password for invalid user co from 159.65.34.82 port 54772 ssh2
2019-07-10T23:29:04.749038cavecanem sshd[8132]: Invalid user foo from 159.65.34.82 port 46686
2019-07-10T23:29:04.751491cavecanem sshd[8132]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.34.82
2019-07-10T23:29:04.749038cavecanem sshd[8132]: Invalid user foo from 159.65.34.82 port 46686
2019-07-10T23:29:06.385056cavecanem sshd[8132]: Failed password for invalid user foo from 159.65.34.82 port 46686 ssh2
2019-07-10T23:30:23.724006cavecanem sshd[8541]: Invalid user nadmin from 159.65.34.82 port 
...
2019-07-11 06:00:49
45.252.249.18 attackspambots
xmlrpc attack
2019-07-11 05:48:47
173.82.245.187 attackspambots
Jul 10 22:29:18 mail sshd[4238]: Invalid user pasquale from 173.82.245.187
Jul 10 22:29:18 mail sshd[4238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.82.245.187
Jul 10 22:29:18 mail sshd[4238]: Invalid user pasquale from 173.82.245.187
Jul 10 22:29:20 mail sshd[4238]: Failed password for invalid user pasquale from 173.82.245.187 port 33738 ssh2
Jul 10 22:35:25 mail sshd[5101]: Invalid user weblogic from 173.82.245.187
...
2019-07-11 05:34:55
103.219.61.3 attack
Jul 11 02:01:27 areeb-Workstation sshd\[31053\]: Invalid user media from 103.219.61.3
Jul 11 02:01:27 areeb-Workstation sshd\[31053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.61.3
Jul 11 02:01:30 areeb-Workstation sshd\[31053\]: Failed password for invalid user media from 103.219.61.3 port 41760 ssh2
...
2019-07-11 06:05:48
50.248.154.57 attackspam
$f2bV_matches
2019-07-11 05:45:51
198.169.113.55 attack
Jul 10 21:01:39 localhost sshd\[5376\]: Invalid user vvv from 198.169.113.55
Jul 10 21:01:39 localhost sshd\[5376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.169.113.55
Jul 10 21:01:42 localhost sshd\[5376\]: Failed password for invalid user vvv from 198.169.113.55 port 46279 ssh2
Jul 10 21:06:04 localhost sshd\[5539\]: Invalid user support from 198.169.113.55
Jul 10 21:06:04 localhost sshd\[5539\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.169.113.55
...
2019-07-11 05:42:23
218.92.0.135 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.135  user=root
Failed password for root from 218.92.0.135 port 63006 ssh2
Failed password for root from 218.92.0.135 port 63006 ssh2
Failed password for root from 218.92.0.135 port 63006 ssh2
Failed password for root from 218.92.0.135 port 63006 ssh2
2019-07-11 05:42:00
185.220.101.57 attackspam
Automatic report - Web App Attack
2019-07-11 05:53:26
66.11.32.201 attackspambots
$f2bV_matches
2019-07-11 05:59:14
130.255.138.189 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-10 21:04:49]
2019-07-11 05:35:28
109.74.196.234 attack
Jul 10 20:59:46 mailserver sshd[9348]: Invalid user pv from 109.74.196.234
Jul 10 20:59:46 mailserver sshd[9348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.74.196.234
Jul 10 20:59:48 mailserver sshd[9348]: Failed password for invalid user pv from 109.74.196.234 port 59200 ssh2
Jul 10 20:59:48 mailserver sshd[9348]: Received disconnect from 109.74.196.234 port 59200:11: Bye Bye [preauth]
Jul 10 20:59:48 mailserver sshd[9348]: Disconnected from 109.74.196.234 port 59200 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=109.74.196.234
2019-07-11 06:03:31

Recently Reported IPs

125.212.244.109 181.164.41.194 37.59.58.8 101.36.118.86
45.14.224.238 194.190.143.48 177.220.174.2 123.23.183.76
51.178.53.78 129.208.199.139 121.121.100.143 93.42.225.250
101.36.110.202 95.111.194.171 177.134.162.97 182.254.166.97
103.45.130.165 5.62.136.142 116.196.120.254 142.44.211.27