Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.23.18.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.23.18.242.			IN	A

;; AUTHORITY SECTION:
.			356	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 14:18:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 242.18.23.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.18.23.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
43.239.176.113 attackspam
Dec 13 07:05:40 mail sshd[24684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.239.176.113 
Dec 13 07:05:42 mail sshd[24684]: Failed password for invalid user verona from 43.239.176.113 port 31327 ssh2
Dec 13 07:11:10 mail sshd[25525]: Failed password for root from 43.239.176.113 port 31870 ssh2
2019-12-13 15:00:29
185.80.70.47 attack
Dec 13 08:33:39 sauna sshd[17093]: Failed password for root from 185.80.70.47 port 42508 ssh2
Dec 13 08:39:51 sauna sshd[17317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.80.70.47
...
2019-12-13 14:51:35
195.239.162.94 attackbots
Dec 13 07:32:22 heissa sshd\[3843\]: Invalid user feri from 195.239.162.94 port 45646
Dec 13 07:32:22 heissa sshd\[3843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.162.94
Dec 13 07:32:25 heissa sshd\[3843\]: Failed password for invalid user feri from 195.239.162.94 port 45646 ssh2
Dec 13 07:32:44 heissa sshd\[3916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.239.162.94  user=postgres
Dec 13 07:32:46 heissa sshd\[3916\]: Failed password for postgres from 195.239.162.94 port 35674 ssh2
2019-12-13 15:25:06
188.166.105.228 attack
Dec 13 06:35:49 localhost sshd\[4570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.105.228  user=mysql
Dec 13 06:35:51 localhost sshd\[4570\]: Failed password for mysql from 188.166.105.228 port 43716 ssh2
Dec 13 06:40:50 localhost sshd\[4791\]: Invalid user gra from 188.166.105.228 port 52282
Dec 13 06:40:50 localhost sshd\[4791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.105.228
Dec 13 06:40:52 localhost sshd\[4791\]: Failed password for invalid user gra from 188.166.105.228 port 52282 ssh2
...
2019-12-13 14:50:50
134.209.50.169 attack
Dec 12 21:04:08 php1 sshd\[7380\]: Invalid user rockwell from 134.209.50.169
Dec 12 21:04:08 php1 sshd\[7380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.50.169
Dec 12 21:04:09 php1 sshd\[7380\]: Failed password for invalid user rockwell from 134.209.50.169 port 50688 ssh2
Dec 12 21:09:26 php1 sshd\[8070\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.50.169  user=root
Dec 12 21:09:28 php1 sshd\[8070\]: Failed password for root from 134.209.50.169 port 60114 ssh2
2019-12-13 15:19:16
146.88.240.4 attackspambots
13.12.2019 07:06:11 Connection to port 27017 blocked by firewall
2019-12-13 15:09:36
167.86.68.12 attackspambots
12/13/2019-01:40:20.084468 167.86.68.12 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-12-13 15:08:18
195.246.50.102 attack
Port 1433 Scan
2019-12-13 14:49:31
49.235.92.208 attack
Dec 12 20:57:02 eddieflores sshd\[5654\]: Invalid user maverick from 49.235.92.208
Dec 12 20:57:02 eddieflores sshd\[5654\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.208
Dec 12 20:57:04 eddieflores sshd\[5654\]: Failed password for invalid user maverick from 49.235.92.208 port 51432 ssh2
Dec 12 21:05:05 eddieflores sshd\[6334\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.208  user=root
Dec 12 21:05:06 eddieflores sshd\[6334\]: Failed password for root from 49.235.92.208 port 42746 ssh2
2019-12-13 15:15:01
91.207.40.44 attack
2019-12-13T06:50:19.824638shield sshd\[11722\]: Invalid user aparicio from 91.207.40.44 port 33380
2019-12-13T06:50:19.829872shield sshd\[11722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.44
2019-12-13T06:50:22.477720shield sshd\[11722\]: Failed password for invalid user aparicio from 91.207.40.44 port 33380 ssh2
2019-12-13T06:56:09.808859shield sshd\[12543\]: Invalid user ack from 91.207.40.44 port 43342
2019-12-13T06:56:09.815057shield sshd\[12543\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.207.40.44
2019-12-13 15:13:03
183.196.213.214 attack
Unauthorised access (Dec 13) SRC=183.196.213.214 LEN=40 TOS=0x04 TTL=51 ID=31726 TCP DPT=8080 WINDOW=26395 SYN 
Unauthorised access (Dec 13) SRC=183.196.213.214 LEN=40 TTL=50 ID=59617 TCP DPT=23 WINDOW=45008 SYN 
Unauthorised access (Dec 12) SRC=183.196.213.214 LEN=40 TOS=0x04 TTL=51 ID=52856 TCP DPT=8080 WINDOW=60043 SYN 
Unauthorised access (Dec 11) SRC=183.196.213.214 LEN=40 TOS=0x04 TTL=51 ID=8037 TCP DPT=8080 WINDOW=26395 SYN 
Unauthorised access (Dec 10) SRC=183.196.213.214 LEN=40 TOS=0x04 TTL=51 ID=52835 TCP DPT=8080 WINDOW=26395 SYN 
Unauthorised access (Dec 10) SRC=183.196.213.214 LEN=40 TOS=0x04 TTL=51 ID=8693 TCP DPT=8080 WINDOW=26395 SYN
2019-12-13 15:07:29
80.228.4.194 attackspambots
Dec 13 07:36:56 mail sshd[29047]: Failed password for root from 80.228.4.194 port 53115 ssh2
Dec 13 07:42:24 mail sshd[30086]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.228.4.194 
Dec 13 07:42:26 mail sshd[30086]: Failed password for invalid user ardovino from 80.228.4.194 port 19924 ssh2
2019-12-13 14:58:39
156.204.1.78 attackspam
SSH brutforce
2019-12-13 15:03:02
190.67.116.12 attackbots
Dec 13 07:09:36 mail sshd[25278]: Failed password for root from 190.67.116.12 port 53248 ssh2
Dec 13 07:18:33 mail sshd[26541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.67.116.12 
Dec 13 07:18:36 mail sshd[26541]: Failed password for invalid user admin from 190.67.116.12 port 58910 ssh2
2019-12-13 14:50:21
221.204.11.106 attack
Dec 13 07:02:48 mail sshd[24264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.204.11.106 
Dec 13 07:02:49 mail sshd[24264]: Failed password for invalid user tabique from 221.204.11.106 port 45046 ssh2
Dec 13 07:10:38 mail sshd[25456]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.204.11.106
2019-12-13 14:46:25

Recently Reported IPs

166.208.211.222 232.36.210.23 63.9.6.155 58.213.205.190
100.10.123.19 61.201.212.157 115.195.71.72 61.80.190.182
79.106.165.238 183.193.137.163 22.157.6.9 149.182.141.125
204.155.243.12 187.85.195.141 252.252.252.252 39.148.96.244
13.107.169.96 128.35.234.72 193.202.240.126 225.252.200.30