Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Euclides da Cunha

Region: Bahia

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: Allconnect Tecnologia Ltda Me

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.242.61.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23614
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;191.242.61.243.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Wed Apr 24 20:18:00 +08 2019
;; MSG SIZE  rcvd: 118

Host info
243.61.242.191.in-addr.arpa domain name pointer 191.242.61.243-user.allconnect.net.br.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
243.61.242.191.in-addr.arpa	name = 191.242.61.243-user.allconnect.net.br.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
185.244.214.198 attack
fail2ban - Attack against Apache (too many 404s)
2020-06-12 15:38:31
139.199.30.155 attackbotsspam
Jun 12 09:27:03 lnxweb61 sshd[17304]: Failed password for root from 139.199.30.155 port 58016 ssh2
Jun 12 09:31:52 lnxweb61 sshd[22376]: Failed password for root from 139.199.30.155 port 44446 ssh2
2020-06-12 15:38:02
104.214.114.179 attack
Brute forcing email accounts
2020-06-12 15:43:42
104.45.88.60 attackspambots
Jun 11 23:15:39 server1 sshd\[13637\]: Failed password for invalid user username from 104.45.88.60 port 55704 ssh2
Jun 11 23:19:21 server1 sshd\[16276\]: Invalid user qgg from 104.45.88.60
Jun 11 23:19:21 server1 sshd\[16276\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.45.88.60 
Jun 11 23:19:23 server1 sshd\[16276\]: Failed password for invalid user qgg from 104.45.88.60 port 58744 ssh2
Jun 11 23:23:17 server1 sshd\[19041\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.45.88.60  user=root
...
2020-06-12 15:15:34
222.186.30.35 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-06-12 15:33:42
106.12.109.33 attackspam
Jun 12 09:45:37 gw1 sshd[1594]: Failed password for root from 106.12.109.33 port 35332 ssh2
...
2020-06-12 15:15:08
167.172.185.179 attack
Jun 12 06:48:02 *** sshd[24033]: Invalid user admin from 167.172.185.179
2020-06-12 15:18:19
222.186.42.136 attackspam
SSH bruteforce
2020-06-12 15:34:45
113.165.56.53 attackbotsspam
20/6/11@23:55:20: FAIL: Alarm-Network address from=113.165.56.53
...
2020-06-12 15:11:41
106.54.200.209 attackspam
Jun 11 20:55:17 mockhub sshd[28999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.200.209
Jun 11 20:55:19 mockhub sshd[28999]: Failed password for invalid user djh from 106.54.200.209 port 60940 ssh2
...
2020-06-12 15:13:39
49.233.182.205 attackbots
Jun 12 13:55:31 NG-HHDC-SVS-001 sshd[26711]: Invalid user deploy from 49.233.182.205
...
2020-06-12 15:04:58
36.66.170.127 attack
20/6/12@01:55:09: FAIL: Alarm-Network address from=36.66.170.127
...
2020-06-12 15:08:51
179.191.237.172 attackspam
Invalid user yj from 179.191.237.172 port 55187
2020-06-12 15:12:56
51.83.141.61 attackbots
Hit on CMS login honeypot
2020-06-12 15:09:17
186.15.88.198 attackbotsspam
Automatic report - XMLRPC Attack
2020-06-12 15:40:00

Recently Reported IPs

85.196.133.114 117.133.235.141 41.130.131.145 102.167.68.218
182.78.154.56 220.143.63.51 220.0.192.185 36.242.82.176
212.34.61.98 151.18.191.6 88.6.229.54 94.8.2.241
58.167.87.6 200.202.246.178 94.249.53.25 91.71.16.0
49.164.237.95 62.234.172.19 27.147.243.183 166.41.55.3