Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.245.80.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;161.245.80.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021002 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 08:42:53 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 242.80.245.161.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 161.245.80.242.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
61.177.172.61 attackbotsspam
Aug 28 23:11:32 PorscheCustomer sshd[9387]: Failed password for root from 61.177.172.61 port 29714 ssh2
Aug 28 23:11:36 PorscheCustomer sshd[9387]: Failed password for root from 61.177.172.61 port 29714 ssh2
Aug 28 23:11:46 PorscheCustomer sshd[9387]: error: maximum authentication attempts exceeded for root from 61.177.172.61 port 29714 ssh2 [preauth]
...
2020-08-29 05:16:55
222.186.173.183 attack
Aug 28 22:35:27 vps1 sshd[11879]: Failed none for invalid user root from 222.186.173.183 port 59250 ssh2
Aug 28 22:35:27 vps1 sshd[11879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Aug 28 22:35:29 vps1 sshd[11879]: Failed password for invalid user root from 222.186.173.183 port 59250 ssh2
Aug 28 22:35:35 vps1 sshd[11879]: Failed password for invalid user root from 222.186.173.183 port 59250 ssh2
Aug 28 22:35:37 vps1 sshd[11879]: Failed password for invalid user root from 222.186.173.183 port 59250 ssh2
Aug 28 22:35:42 vps1 sshd[11879]: Failed password for invalid user root from 222.186.173.183 port 59250 ssh2
Aug 28 22:35:47 vps1 sshd[11879]: Failed password for invalid user root from 222.186.173.183 port 59250 ssh2
Aug 28 22:35:47 vps1 sshd[11879]: error: maximum authentication attempts exceeded for invalid user root from 222.186.173.183 port 59250 ssh2 [preauth]
...
2020-08-29 04:51:08
94.23.179.193 attack
Aug 28 22:25:14 ns381471 sshd[18239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.179.193
Aug 28 22:25:16 ns381471 sshd[18239]: Failed password for invalid user vnc from 94.23.179.193 port 55431 ssh2
2020-08-29 04:40:58
192.241.233.238 attackbots
*Port Scan* detected from 192.241.233.238 (US/United States/California/San Francisco/zg-0823b-175.stretchoid.com). 4 hits in the last 241 seconds
2020-08-29 04:48:18
181.143.226.67 attack
Aug 28 20:39:48 rush sshd[21491]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.226.67
Aug 28 20:39:50 rush sshd[21491]: Failed password for invalid user minecraft from 181.143.226.67 port 49378 ssh2
Aug 28 20:42:58 rush sshd[21563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.143.226.67
...
2020-08-29 04:58:30
188.191.23.191 attack
Many attempts
2020-08-29 04:48:41
161.35.172.8 attack
2020-08-28T20:30:04.681Z CLOSE host=161.35.172.8 port=57274 fd=4 time=20.009 bytes=10
...
2020-08-29 05:10:06
222.254.23.75 attackspambots
1598646283 - 08/28/2020 22:24:43 Host: 222.254.23.75/222.254.23.75 Port: 445 TCP Blocked
2020-08-29 05:14:53
34.69.199.255 attackspam
Invalid user bitnami from 34.69.199.255 port 59002
2020-08-29 05:23:11
61.132.225.37 attackbots
Port Scan
...
2020-08-29 05:19:01
82.221.100.91 attack
Aug 28 22:04:48 ns392434 sshd[3181]: Invalid user sce from 82.221.100.91 port 42920
Aug 28 22:04:48 ns392434 sshd[3181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.221.100.91
Aug 28 22:04:48 ns392434 sshd[3181]: Invalid user sce from 82.221.100.91 port 42920
Aug 28 22:04:50 ns392434 sshd[3181]: Failed password for invalid user sce from 82.221.100.91 port 42920 ssh2
Aug 28 22:21:34 ns392434 sshd[3699]: Invalid user rabbitmq from 82.221.100.91 port 44536
Aug 28 22:21:34 ns392434 sshd[3699]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.221.100.91
Aug 28 22:21:34 ns392434 sshd[3699]: Invalid user rabbitmq from 82.221.100.91 port 44536
Aug 28 22:21:35 ns392434 sshd[3699]: Failed password for invalid user rabbitmq from 82.221.100.91 port 44536 ssh2
Aug 28 22:28:41 ns392434 sshd[3901]: Invalid user lucas from 82.221.100.91 port 51786
2020-08-29 05:01:54
51.83.185.192 attack
*Port Scan* detected from 51.83.185.192 (PL/Poland/Mazovia/Warsaw/vps-d7f4e403.vps.ovh.net). 4 hits in the last 100 seconds
2020-08-29 04:46:34
104.224.138.177 attackspam
Aug 27 14:03:46 moo sshd[15901]: Failed password for invalid user cib from 104.224.138.177 port 37956 ssh2
Aug 27 14:18:23 moo sshd[16704]: Failed password for invalid user bss from 104.224.138.177 port 58352 ssh2
Aug 27 14:22:16 moo sshd[16927]: Failed password for r.r from 104.224.138.177 port 41092 ssh2
Aug 27 14:33:40 moo sshd[17491]: Failed password for invalid user evelyn from 104.224.138.177 port 45760 ssh2
Aug 27 14:37:45 moo sshd[17702]: Failed password for invalid user carlos from 104.224.138.177 port 56730 ssh2
Aug 27 14:56:49 moo sshd[18819]: Failed password for r.r from 104.224.138.177 port 33168 ssh2
Aug 27 15:06:19 moo sshd[19341]: Failed password for invalid user anna from 104.224.138.177 port 44134 ssh2
Aug 27 15:24:54 moo sshd[20449]: Failed password for invalid user parker from 104.224.138.177 port 37824 ssh2
Aug 27 15:34:38 moo sshd[21014]: Failed password for r.r from 104.224.138.177 port 48790 ssh2
Aug 27 15:53:36 moo sshd[22304]: Failed password fo........
------------------------------
2020-08-29 05:20:45
143.92.42.120 attackspam
Time:     Fri Aug 28 20:23:50 2020 +0000
IP:       143.92.42.120 (-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 28 20:03:37 ca-16-ede1 sshd[15790]: Invalid user luther from 143.92.42.120 port 52738
Aug 28 20:03:39 ca-16-ede1 sshd[15790]: Failed password for invalid user luther from 143.92.42.120 port 52738 ssh2
Aug 28 20:17:51 ca-16-ede1 sshd[17639]: Invalid user vmail from 143.92.42.120 port 46524
Aug 28 20:17:54 ca-16-ede1 sshd[17639]: Failed password for invalid user vmail from 143.92.42.120 port 46524 ssh2
Aug 28 20:23:46 ca-16-ede1 sshd[18410]: Invalid user git from 143.92.42.120 port 53866
2020-08-29 04:55:36
222.186.190.2 attackspambots
Aug 28 22:42:56 ns381471 sshd[19522]: Failed password for root from 222.186.190.2 port 9140 ssh2
Aug 28 22:43:08 ns381471 sshd[19522]: error: maximum authentication attempts exceeded for root from 222.186.190.2 port 9140 ssh2 [preauth]
2020-08-29 04:43:20

Recently Reported IPs

157.156.174.246 238.245.48.13 233.224.138.55 242.73.149.182
74.217.230.160 81.94.203.179 243.85.230.85 161.246.42.14
46.186.171.59 145.215.66.205 220.239.247.132 24.25.41.106
49.0.30.49 200.100.210.60 151.105.197.114 182.199.68.95
39.195.86.255 177.113.168.35 70.110.8.165 146.245.255.2