Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.192.138.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.192.138.242.		IN	A

;; AUTHORITY SECTION:
.			535	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 06:26:06 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 242.138.192.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.138.192.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.254.255.132 attackbotsspam
46654/tcp
[2019-12-13]1pkt
2019-12-14 00:34:05
51.158.149.139 attackspam
Dec 13 15:54:03 game-panel sshd[26218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.149.139
Dec 13 15:54:05 game-panel sshd[26218]: Failed password for invalid user uberig from 51.158.149.139 port 52364 ssh2
Dec 13 16:00:05 game-panel sshd[26432]: Failed password for root from 51.158.149.139 port 33696 ssh2
2019-12-14 00:07:09
91.204.250.59 attackbots
8080/tcp
[2019-12-13]1pkt
2019-12-14 00:31:54
61.221.213.23 attackbotsspam
Dec 13 17:19:11 lnxded64 sshd[29774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.221.213.23
Dec 13 17:19:11 lnxded64 sshd[29774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.221.213.23
2019-12-14 00:20:07
128.199.118.27 attackbots
Dec 13 06:12:56 kapalua sshd\[11513\]: Invalid user admin from 128.199.118.27
Dec 13 06:12:56 kapalua sshd\[11513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.118.27
Dec 13 06:12:58 kapalua sshd\[11513\]: Failed password for invalid user admin from 128.199.118.27 port 47286 ssh2
Dec 13 06:19:26 kapalua sshd\[12144\]: Invalid user ada from 128.199.118.27
Dec 13 06:19:26 kapalua sshd\[12144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.118.27
2019-12-14 00:36:47
218.92.0.191 attack
Dec 13 17:15:56 dcd-gentoo sshd[7364]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Dec 13 17:15:58 dcd-gentoo sshd[7364]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Dec 13 17:15:56 dcd-gentoo sshd[7364]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Dec 13 17:15:58 dcd-gentoo sshd[7364]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Dec 13 17:15:56 dcd-gentoo sshd[7364]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Dec 13 17:15:58 dcd-gentoo sshd[7364]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Dec 13 17:15:58 dcd-gentoo sshd[7364]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 31254 ssh2
...
2019-12-14 00:25:14
152.249.11.154 attackspam
8080/tcp
[2019-12-13]1pkt
2019-12-14 00:41:57
94.158.83.31 attackspam
Dec 13 16:21:41 XXX sshd[40774]: Invalid user pcap from 94.158.83.31 port 53146
2019-12-14 00:19:47
106.12.13.247 attackspambots
Dec 13 17:13:21 sd-53420 sshd\[727\]: User root from 106.12.13.247 not allowed because none of user's groups are listed in AllowGroups
Dec 13 17:13:21 sd-53420 sshd\[727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247  user=root
Dec 13 17:13:22 sd-53420 sshd\[727\]: Failed password for invalid user root from 106.12.13.247 port 58144 ssh2
Dec 13 17:20:12 sd-53420 sshd\[1269\]: User root from 106.12.13.247 not allowed because none of user's groups are listed in AllowGroups
Dec 13 17:20:12 sd-53420 sshd\[1269\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.247  user=root
...
2019-12-14 00:41:03
175.211.93.29 attack
Dec 13 17:53:30 sauna sshd[34380]: Failed password for daemon from 175.211.93.29 port 39856 ssh2
...
2019-12-14 00:13:25
193.112.32.238 attackbotsspam
Dec 13 16:59:44 * sshd[4656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.32.238
Dec 13 16:59:46 * sshd[4656]: Failed password for invalid user caruso from 193.112.32.238 port 33582 ssh2
2019-12-14 00:33:46
101.230.236.177 attackbotsspam
Dec 13 16:59:37 MK-Soft-VM3 sshd[26823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.230.236.177 
Dec 13 16:59:40 MK-Soft-VM3 sshd[26823]: Failed password for invalid user dddddd from 101.230.236.177 port 39038 ssh2
...
2019-12-14 00:43:03
222.186.173.142 attack
Dec 12 12:23:41 vtv3 sshd[3858]: Failed password for root from 222.186.173.142 port 25134 ssh2
Dec 12 12:50:44 vtv3 sshd[17775]: Failed password for root from 222.186.173.142 port 21210 ssh2
Dec 12 12:50:48 vtv3 sshd[17775]: Failed password for root from 222.186.173.142 port 21210 ssh2
Dec 12 12:50:51 vtv3 sshd[17775]: Failed password for root from 222.186.173.142 port 21210 ssh2
Dec 12 12:50:54 vtv3 sshd[17775]: Failed password for root from 222.186.173.142 port 21210 ssh2
Dec 12 18:54:31 vtv3 sshd[30598]: Failed password for root from 222.186.173.142 port 13200 ssh2
Dec 12 18:54:34 vtv3 sshd[30598]: Failed password for root from 222.186.173.142 port 13200 ssh2
Dec 12 18:54:37 vtv3 sshd[30598]: Failed password for root from 222.186.173.142 port 13200 ssh2
Dec 12 18:54:41 vtv3 sshd[30598]: Failed password for root from 222.186.173.142 port 13200 ssh2
Dec 12 20:33:53 vtv3 sshd[13080]: Failed password for root from 222.186.173.142 port 19268 ssh2
Dec 12 20:33:57 vtv3 sshd[13080]: Failed password for root from 2
2019-12-14 00:04:35
58.248.254.124 attackbotsspam
Dec 13 11:24:52 TORMINT sshd\[13137\]: Invalid user toor from 58.248.254.124
Dec 13 11:24:52 TORMINT sshd\[13137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.248.254.124
Dec 13 11:24:54 TORMINT sshd\[13137\]: Failed password for invalid user toor from 58.248.254.124 port 39276 ssh2
...
2019-12-14 00:35:06
94.25.229.122 attackspam
Unauthorized connection attempt detected from IP address 94.25.229.122 to port 445
2019-12-14 00:34:40

Recently Reported IPs

125.44.129.13 201.150.182.142 115.50.0.11 115.63.132.182
123.63.40.187 27.40.77.68 151.241.214.164 111.19.98.74
185.242.232.217 191.31.123.42 185.159.100.90 190.180.154.81
120.157.9.201 125.99.146.61 45.224.168.222 115.231.148.14
82.151.197.179 87.251.75.89 191.18.94.158 110.169.147.196