Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Darmstadt

Region: Hesse

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.181.94.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51196
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;140.181.94.242.			IN	A

;; AUTHORITY SECTION:
.			579	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042702 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 28 06:48:10 CST 2020
;; MSG SIZE  rcvd: 118
Host info
242.94.181.140.in-addr.arpa domain name pointer dejtag002.gsi.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.94.181.140.in-addr.arpa	name = dejtag002.gsi.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.68.215.159 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:46:20
118.200.237.192 attack
WordPress login Brute force / Web App Attack on client site.
2019-10-28 03:27:23
217.68.215.22 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:37:57
217.68.215.185 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:43:28
217.68.215.139 attackbotsspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:49:55
217.68.215.163 attackbotsspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:45:53
217.68.215.2 attackbotsspam
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:40:03
217.68.214.83 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 04:00:51
217.68.215.206 attackspambots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:39:19
217.68.215.188 attackbots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:42:18
217.68.215.122 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:51:32
217.68.215.255 attackbots
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:27:52
217.68.215.199 attack
Host is trying to send e-mails. Multiple unauthorized connections to SMTP Sever: tcp/25.
2019-10-28 03:41:07
159.65.112.93 attack
Oct 27 08:23:26 kapalua sshd\[28507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.112.93  user=root
Oct 27 08:23:28 kapalua sshd\[28507\]: Failed password for root from 159.65.112.93 port 38874 ssh2
Oct 27 08:27:10 kapalua sshd\[28838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.112.93  user=root
Oct 27 08:27:12 kapalua sshd\[28838\]: Failed password for root from 159.65.112.93 port 47968 ssh2
Oct 27 08:30:52 kapalua sshd\[29104\]: Invalid user tecnici from 159.65.112.93
2019-10-28 03:54:49
45.146.203.216 attack
Postfix DNSBL listed. Trying to send SPAM.
2019-10-28 03:48:05

Recently Reported IPs

104.129.121.62 42.116.209.49 14.143.29.8 91.70.75.212
187.187.199.80 115.61.241.105 74.81.124.242 78.37.57.69
110.216.12.121 119.133.198.136 107.131.139.52 74.87.229.230
86.198.4.229 125.34.199.29 46.238.103.162 18.4.203.87
91.17.126.72 223.112.70.109 137.27.210.41 174.206.38.174