Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 187.242.14.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14343
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;187.242.14.12.			IN	A

;; AUTHORITY SECTION:
.			118	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023061500 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 15 16:49:37 CST 2023
;; MSG SIZE  rcvd: 106
Host info
12.14.242.187.in-addr.arpa domain name pointer customer-DGO-14-12.megared.net.mx.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.14.242.187.in-addr.arpa	name = customer-DGO-14-12.megared.net.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.113.219.135 attackspambots
Brute force SMTP login attempts.
2019-11-03 04:55:38
140.143.198.170 attackbotsspam
Nov  2 21:12:03 v22019058497090703 sshd[16709]: Failed password for root from 140.143.198.170 port 53968 ssh2
Nov  2 21:16:13 v22019058497090703 sshd[16994]: Failed password for root from 140.143.198.170 port 36298 ssh2
...
2019-11-03 04:48:38
191.252.204.15 attackbotsspam
Nov  2 21:19:50 srv206 sshd[19711]: Invalid user crm from 191.252.204.15
Nov  2 21:19:50 srv206 sshd[19711]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps15489.publiccloud.com.br
Nov  2 21:19:50 srv206 sshd[19711]: Invalid user crm from 191.252.204.15
Nov  2 21:19:53 srv206 sshd[19711]: Failed password for invalid user crm from 191.252.204.15 port 59871 ssh2
...
2019-11-03 05:04:58
125.99.173.162 attackbotsspam
2019-11-02T20:20:37.851374abusebot-4.cloudsearch.cf sshd\[14397\]: Invalid user sales from 125.99.173.162 port 18612
2019-11-03 04:37:44
167.71.231.150 attackbotsspam
Automatic report - Banned IP Access
2019-11-03 05:11:39
95.213.129.163 attack
firewall-block, port(s): 3391/tcp
2019-11-03 04:44:23
177.67.203.127 attackspam
Automatic report - Banned IP Access
2019-11-03 05:04:08
60.191.52.254 attackbotsspam
400 BAD REQUEST
2019-11-03 04:54:40
222.186.173.142 attack
Brute force attempt
2019-11-03 04:50:37
46.38.144.57 attack
Nov  2 21:40:03 relay postfix/smtpd\[7599\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  2 21:40:31 relay postfix/smtpd\[14460\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  2 21:41:14 relay postfix/smtpd\[19987\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  2 21:41:40 relay postfix/smtpd\[18475\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  2 21:42:24 relay postfix/smtpd\[19987\]: warning: unknown\[46.38.144.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-03 04:46:55
162.243.59.16 attackbots
$f2bV_matches
2019-11-03 04:58:23
189.27.18.159 attackspam
Automatic report - Port Scan Attack
2019-11-03 04:55:11
170.150.155.102 attack
Nov  2 21:32:29 meumeu sshd[539]: Failed password for root from 170.150.155.102 port 45752 ssh2
Nov  2 21:36:53 meumeu sshd[1312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.150.155.102 
Nov  2 21:36:55 meumeu sshd[1312]: Failed password for invalid user lv from 170.150.155.102 port 55834 ssh2
...
2019-11-03 05:14:00
201.222.168.149 attackspam
B: Magento admin pass /admin/ test (wrong country)
2019-11-03 04:48:04
27.128.233.104 attack
2019-11-02T20:52:15.995836abusebot-4.cloudsearch.cf sshd\[14516\]: Invalid user nita from 27.128.233.104 port 34780
2019-11-03 05:11:02

Recently Reported IPs

61.255.102.156 136.158.10.161 117.240.125.82 173.242.117.111
117.219.13.248 59.49.19.46 94.158.247.123 34.95.165.101
117.198.228.142 18.141.212.81 93.212.244.165 101.67.14.94
24.225.204.55 126.97.167.204 45.117.182.137 45.117.182.174
45.117.182.198 69.247.85.48 219.100.37.216 39.61.49.59