Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 200.66.219.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;200.66.219.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013101 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 04:51:33 CST 2025
;; MSG SIZE  rcvd: 107
Host info
242.219.66.200.in-addr.arpa domain name pointer dup-200-66-219-242.prodigy.net.mx.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.219.66.200.in-addr.arpa	name = dup-200-66-219-242.prodigy.net.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.136.166.114 attack
Oct 15 05:47:05 vps691689 sshd[2161]: Failed password for root from 186.136.166.114 port 49566 ssh2
Oct 15 05:47:11 vps691689 sshd[2163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.136.166.114
...
2019-10-15 17:11:03
41.141.250.244 attackbots
$f2bV_matches
2019-10-15 17:16:41
46.38.144.32 attack
Oct 15 11:13:03 relay postfix/smtpd\[15455\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 15 11:13:38 relay postfix/smtpd\[18882\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 15 11:16:43 relay postfix/smtpd\[15330\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 15 11:17:25 relay postfix/smtpd\[18802\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 15 11:20:27 relay postfix/smtpd\[15330\]: warning: unknown\[46.38.144.32\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-15 17:25:59
190.210.42.209 attackspam
Brute force SMTP login attempted.
...
2019-10-15 17:27:58
117.54.158.213 attackspam
Automatic report - Port Scan Attack
2019-10-15 17:19:59
180.66.34.140 attackspam
2019-10-15T08:56:46.867907abusebot-5.cloudsearch.cf sshd\[3241\]: Invalid user bjorn from 180.66.34.140 port 48124
2019-10-15 17:23:28
157.230.247.239 attackspam
Oct 15 10:35:02 sauna sshd[208692]: Failed password for root from 157.230.247.239 port 45160 ssh2
...
2019-10-15 17:13:10
95.54.13.12 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/95.54.13.12/ 
 RU - 1H : (103)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : RU 
 NAME ASN : ASN12389 
 
 IP : 95.54.13.12 
 
 CIDR : 95.54.0.0/18 
 
 PREFIX COUNT : 2741 
 
 UNIQUE IP COUNT : 8699648 
 
 
 WYKRYTE ATAKI Z ASN12389 :  
  1H - 1 
  3H - 7 
  6H - 10 
 12H - 15 
 24H - 24 
 
 DateTime : 2019-10-15 05:47:37 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-15 16:51:47
2.10.141.116 attackbots
Fail2Ban Ban Triggered
2019-10-15 17:06:48
178.159.249.66 attackspam
2019-10-15T06:52:25.275129abusebot-2.cloudsearch.cf sshd\[4429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.159.249.66  user=root
2019-10-15 17:23:45
181.123.9.68 attack
Oct 15 05:51:08 firewall sshd[18987]: Failed password for invalid user zliu from 181.123.9.68 port 59294 ssh2
Oct 15 05:58:31 firewall sshd[19156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.123.9.68  user=root
Oct 15 05:58:33 firewall sshd[19156]: Failed password for root from 181.123.9.68 port 43622 ssh2
...
2019-10-15 17:12:45
81.22.45.48 attackbots
10/15/2019-05:01:39.620125 81.22.45.48 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-15 17:13:35
199.231.190.121 attackbots
Oct 15 02:39:53 DNS-2 sshd[24148]: User r.r from 199.231.190.121 not allowed because not listed in AllowUsers
Oct 15 02:39:53 DNS-2 sshd[24148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.231.190.121  user=r.r
Oct 15 02:39:55 DNS-2 sshd[24148]: Failed password for invalid user r.r from 199.231.190.121 port 49884 ssh2
Oct 15 02:39:55 DNS-2 sshd[24148]: Received disconnect from 199.231.190.121 port 49884:11: Bye Bye [preauth]
Oct 15 02:39:55 DNS-2 sshd[24148]: Disconnected from 199.231.190.121 port 49884 [preauth]
Oct 15 02:54:28 DNS-2 sshd[24790]: User r.r from 199.231.190.121 not allowed because not listed in AllowUsers
Oct 15 02:54:28 DNS-2 sshd[24790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=199.231.190.121  user=r.r
Oct 15 02:54:30 DNS-2 sshd[24790]: Failed password for invalid user r.r from 199.231.190.121 port 38348 ssh2
Oct 15 02:54:30 DNS-2 sshd[24790]: Received disco........
-------------------------------
2019-10-15 17:05:05
117.185.62.146 attack
2019-10-15T08:51:12.684130abusebot-8.cloudsearch.cf sshd\[25943\]: Invalid user oracle from 117.185.62.146 port 36917
2019-10-15 17:01:51
187.59.126.70 attackspam
Automatic report - Port Scan Attack
2019-10-15 17:12:28

Recently Reported IPs

74.212.252.38 28.153.66.209 44.211.99.223 68.189.250.63
103.75.159.248 184.63.193.158 87.216.35.94 128.241.94.95
164.30.83.97 96.101.31.5 7.160.128.2 153.73.46.24
19.225.59.50 145.170.230.197 104.181.5.30 109.237.48.155
240.134.122.229 179.194.95.252 72.10.136.75 85.88.108.26