Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.242.8.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21346
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;191.242.8.18.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 00:23:29 CST 2022
;; MSG SIZE  rcvd: 105
Host info
18.8.242.191.in-addr.arpa domain name pointer br-go-gsia-191-242-8-18.vocenafrente.com.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
18.8.242.191.in-addr.arpa	name = br-go-gsia-191-242-8-18.vocenafrente.com.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
24.233.110.183 attackbots
1583812198 - 03/10/2020 04:49:58 Host: 24.233.110.183/24.233.110.183 Port: 23 TCP Blocked
2020-03-10 16:57:10
106.52.240.160 attackspam
Mar 10 04:45:14 xeon sshd[14301]: Failed password for invalid user teamspeak from 106.52.240.160 port 54048 ssh2
2020-03-10 16:54:48
49.88.112.114 attackbotsspam
Mar 10 10:28:04 OPSO sshd\[3249\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Mar 10 10:28:06 OPSO sshd\[3249\]: Failed password for root from 49.88.112.114 port 12850 ssh2
Mar 10 10:28:09 OPSO sshd\[3249\]: Failed password for root from 49.88.112.114 port 12850 ssh2
Mar 10 10:28:11 OPSO sshd\[3249\]: Failed password for root from 49.88.112.114 port 12850 ssh2
Mar 10 10:28:58 OPSO sshd\[3252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
2020-03-10 17:34:56
192.241.213.144 attackspambots
Honeypot hit.
2020-03-10 17:21:12
104.248.58.71 attack
Mar 10 08:11:25 amit sshd\[25907\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.58.71  user=root
Mar 10 08:11:26 amit sshd\[25907\]: Failed password for root from 104.248.58.71 port 53124 ssh2
Mar 10 08:16:34 amit sshd\[28375\]: Invalid user dev from 104.248.58.71
Mar 10 08:16:34 amit sshd\[28375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.58.71
...
2020-03-10 17:24:33
164.132.44.218 attackspam
Mar 10 13:36:06 gw1 sshd[23185]: Failed password for root from 164.132.44.218 port 57040 ssh2
...
2020-03-10 16:55:52
42.119.7.37 attackspambots
Automatic report - Port Scan Attack
2020-03-10 17:13:56
176.31.127.152 attack
Mar 10 08:54:35 ks10 sshd[1402638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.127.152 
Mar 10 08:54:37 ks10 sshd[1402638]: Failed password for invalid user tech from 176.31.127.152 port 55382 ssh2
...
2020-03-10 17:29:26
197.44.52.200 attack
Brute force attempt
2020-03-10 17:12:57
119.146.145.104 attackbotsspam
Mar 10 10:49:03 pkdns2 sshd\[689\]: Failed password for root from 119.146.145.104 port 2747 ssh2Mar 10 10:51:31 pkdns2 sshd\[822\]: Failed password for root from 119.146.145.104 port 2748 ssh2Mar 10 10:53:46 pkdns2 sshd\[882\]: Invalid user sshuser from 119.146.145.104Mar 10 10:53:48 pkdns2 sshd\[882\]: Failed password for invalid user sshuser from 119.146.145.104 port 2749 ssh2Mar 10 10:56:10 pkdns2 sshd\[1035\]: Failed password for root from 119.146.145.104 port 2750 ssh2Mar 10 10:58:33 pkdns2 sshd\[1098\]: Invalid user hplip from 119.146.145.104Mar 10 10:58:34 pkdns2 sshd\[1098\]: Failed password for invalid user hplip from 119.146.145.104 port 2751 ssh2
...
2020-03-10 17:12:07
92.118.38.42 attackspambots
2020-03-10 10:03:19 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=nbryant@no-server.de\)
2020-03-10 10:03:27 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=nbryant@no-server.de\)
2020-03-10 10:03:28 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=nbryant@no-server.de\)
2020-03-10 10:03:31 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=nbryant@no-server.de\)
2020-03-10 10:03:40 dovecot_login authenticator failed for \(User\) \[92.118.38.42\]: 535 Incorrect authentication data \(set_id=nalexander@no-server.de\)
...
2020-03-10 17:10:58
113.183.138.140 attackspambots
1583812188 - 03/10/2020 04:49:48 Host: 113.183.138.140/113.183.138.140 Port: 445 TCP Blocked
2020-03-10 17:04:17
162.243.98.66 attack
ssh brute force
2020-03-10 17:03:31
172.81.215.106 attackbotsspam
Mar  9 21:04:36 mockhub sshd[29122]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.215.106
Mar  9 21:04:39 mockhub sshd[29122]: Failed password for invalid user ssh from 172.81.215.106 port 35234 ssh2
...
2020-03-10 17:20:52
65.34.120.176 attack
2020-03-10T04:47:53.867052mail.thespaminator.com sshd[2531]: Invalid user hadoop from 65.34.120.176 port 42837
2020-03-10T04:47:55.859941mail.thespaminator.com sshd[2531]: Failed password for invalid user hadoop from 65.34.120.176 port 42837 ssh2
...
2020-03-10 17:26:09

Recently Reported IPs

156.199.157.139 120.86.253.130 45.33.74.23 46.101.61.245
200.194.45.83 151.239.244.233 70.70.245.6 84.197.93.150
154.212.7.26 101.18.124.86 186.5.193.21 200.58.134.234
170.205.161.203 49.213.205.40 157.245.149.1 23.124.126.128
201.156.161.52 162.237.32.131 190.96.74.143 189.213.85.1