Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: J E Provedor de Rede de Comunicacao Ltda

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackspam
Lines containing failures of 191.242.238.54
Dec 10 07:46:30 hvs sshd[189844]: Invalid user user from 191.242.238.54 port 7623
Dec 10 07:46:30 hvs sshd[189844]: Connection closed by invalid user user 191.242.238.54 port 7623 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=191.242.238.54
2019-12-10 15:38:06
Comments on same subnet:
IP Type Details Datetime
191.242.238.177 attack
2020-03-01T06:32:45.045688linuxbox-skyline sshd[75791]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.242.238.177  user=root
2020-03-01T06:32:47.185417linuxbox-skyline sshd[75791]: Failed password for root from 191.242.238.177 port 32941 ssh2
...
2020-03-02 00:07:54
191.242.238.31 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-01 20:54:52
191.242.238.31 attack
[portscan] tcp/1433 [MsSQL]
in spfbl.net:'listed'
*(RWIN=1024)(10151156)
2019-10-16 00:22:00
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.242.238.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6327
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;191.242.238.54.			IN	A

;; AUTHORITY SECTION:
.			239	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121000 1800 900 604800 86400

;; Query time: 192 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 10 15:38:02 CST 2019
;; MSG SIZE  rcvd: 118
Host info
54.238.242.191.in-addr.arpa domain name pointer 54.238.242.191.redebrasiltelecom.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
54.238.242.191.in-addr.arpa	name = 54.238.242.191.redebrasiltelecom.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.87.76.77 attackbots
Invalid user httpd from 58.87.76.77 port 35172
2020-08-22 15:02:36
14.231.199.2 attack
1598068343 - 08/22/2020 05:52:23 Host: 14.231.199.2/14.231.199.2 Port: 445 TCP Blocked
2020-08-22 15:00:17
51.75.56.35 attackbots
(From no-replylup@google.com) Hеllо! 
If you want to get ahead of your competition, have a higher Domain Authority score. Its just simple as that. 
With our service you get Domain Authority above 50 points in just 30 days. 
 
This service is guaranteed 
 
For more information, check our service here 
https://www.monkeydigital.co/Get-Guaranteed-Domain-Authority-50/ 
 
thank you 
Mike  
Monkey Digital 
support@monkeydigital.co
2020-08-22 15:09:25
52.143.64.68 attack
Automatic report - Port Scan Attack
2020-08-22 15:28:37
61.181.128.242 attackspam
Aug 22 02:06:28 ws22vmsma01 sshd[184404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.181.128.242
Aug 22 02:06:29 ws22vmsma01 sshd[184404]: Failed password for invalid user s from 61.181.128.242 port 24571 ssh2
...
2020-08-22 15:18:48
51.255.35.41 attack
Invalid user tiziano from 51.255.35.41 port 48745
2020-08-22 15:25:36
212.107.238.101 attack
Dovecot Invalid User Login Attempt.
2020-08-22 15:12:06
222.186.169.194 attackbotsspam
Aug 22 03:44:12 firewall sshd[18165]: Failed password for root from 222.186.169.194 port 54302 ssh2
Aug 22 03:44:16 firewall sshd[18165]: Failed password for root from 222.186.169.194 port 54302 ssh2
Aug 22 03:44:19 firewall sshd[18165]: Failed password for root from 222.186.169.194 port 54302 ssh2
...
2020-08-22 14:54:00
45.95.168.201 attackbotsspam
Invalid user oracle from 45.95.168.201 port 49788
2020-08-22 14:56:20
218.92.0.247 attack
$f2bV_matches
2020-08-22 15:23:03
49.233.155.170 attackbots
SSH Brute Force
2020-08-22 15:30:14
93.107.187.162 attackspam
Aug 22 09:08:51 kh-dev-server sshd[21974]: Failed password for root from 93.107.187.162 port 53942 ssh2
...
2020-08-22 15:12:20
124.11.210.177 attackspam
1598068305 - 08/22/2020 05:51:45 Host: 124.11.210.177/124.11.210.177 Port: 445 TCP Blocked
2020-08-22 15:27:00
80.211.73.25 attack
from:	Dr. Micha William 
reply-to:	info@michawilliamchambers.com
to:	
date:	Aug 22, 2020, 12:48 PM
subject:	From: Dr. Micha William
mailed-by:	albergolittlegarden.it
signed-by:	albergolittlegarden.it
2020-08-22 15:24:05
65.191.76.227 attack
Aug 22 09:29:06 hosting sshd[24143]: Invalid user hduser from 65.191.76.227 port 59282
...
2020-08-22 14:57:28

Recently Reported IPs

107.214.240.160 79.179.146.48 249.167.120.202 122.126.236.228
100.219.150.16 190.222.10.192 32.70.233.235 184.116.136.32
26.86.147.70 201.201.103.249 101.255.248.91 141.88.116.60
211.181.112.78 49.85.46.31 215.246.159.151 22.204.101.9
167.162.19.238 126.57.205.2 176.40.252.214 249.74.51.95