Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
218.242.55.8 attackspam
SSH login attempts with user root.
2019-11-30 05:15:13
218.242.55.86 attackspam
SSH Brute Force, server-1 sshd[27314]: Failed password for invalid user kjellsverre from 218.242.55.86 port 43100 ssh2
2019-11-23 18:32:32
218.242.55.86 attackspambots
Triggered by Fail2Ban at Vostok web server
2019-11-15 17:51:00
218.242.55.86 attackspambots
2019-11-11T23:16:50.410972abusebot-2.cloudsearch.cf sshd\[24494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86  user=root
2019-11-12 07:39:09
218.242.55.86 attackspam
Nov 10 16:00:16 localhost sshd\[2213\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86  user=root
Nov 10 16:00:19 localhost sshd\[2213\]: Failed password for root from 218.242.55.86 port 45728 ssh2
Nov 10 16:04:56 localhost sshd\[2278\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86  user=root
Nov 10 16:04:58 localhost sshd\[2278\]: Failed password for root from 218.242.55.86 port 53314 ssh2
Nov 10 16:09:42 localhost sshd\[2515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86  user=root
...
2019-11-10 23:27:45
218.242.55.86 attackspambots
Oct 30 13:06:41 legacy sshd[4111]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86
Oct 30 13:06:43 legacy sshd[4111]: Failed password for invalid user roxanne from 218.242.55.86 port 33874 ssh2
Oct 30 13:11:43 legacy sshd[4213]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86
...
2019-10-30 20:31:42
218.242.55.86 attack
Oct 10 20:02:54 heissa sshd\[14486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86  user=root
Oct 10 20:02:55 heissa sshd\[14486\]: Failed password for root from 218.242.55.86 port 54304 ssh2
Oct 10 20:07:16 heissa sshd\[15176\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86  user=root
Oct 10 20:07:18 heissa sshd\[15176\]: Failed password for root from 218.242.55.86 port 34308 ssh2
Oct 10 20:11:28 heissa sshd\[15876\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86  user=root
2019-10-15 00:42:02
218.242.55.86 attackspam
Oct 13 12:00:55 friendsofhawaii sshd\[11723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86  user=root
Oct 13 12:00:56 friendsofhawaii sshd\[11723\]: Failed password for root from 218.242.55.86 port 50418 ssh2
Oct 13 12:05:41 friendsofhawaii sshd\[12086\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86  user=root
Oct 13 12:05:43 friendsofhawaii sshd\[12086\]: Failed password for root from 218.242.55.86 port 32870 ssh2
Oct 13 12:10:36 friendsofhawaii sshd\[12623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86  user=root
2019-10-14 06:25:57
218.242.55.86 attack
Sep  3 19:16:17 eddieflores sshd\[31343\]: Invalid user cron from 218.242.55.86
Sep  3 19:16:17 eddieflores sshd\[31343\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86
Sep  3 19:16:19 eddieflores sshd\[31343\]: Failed password for invalid user cron from 218.242.55.86 port 51880 ssh2
Sep  3 19:22:08 eddieflores sshd\[31916\]: Invalid user hw from 218.242.55.86
Sep  3 19:22:08 eddieflores sshd\[31916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86
2019-09-04 13:28:51
218.242.55.86 attackspambots
Jul 14 17:26:59 mail sshd\[16404\]: Invalid user smiley from 218.242.55.86
Jul 14 17:27:00 mail sshd\[16404\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86
Jul 14 17:27:02 mail sshd\[16404\]: Failed password for invalid user smiley from 218.242.55.86 port 55382 ssh2
...
2019-07-15 03:21:15
218.242.55.86 attackspambots
Jul 12 01:57:52 legacy sshd[18875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86
Jul 12 01:57:55 legacy sshd[18875]: Failed password for invalid user sammy from 218.242.55.86 port 60858 ssh2
Jul 12 02:03:52 legacy sshd[19090]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86
...
2019-07-12 10:16:42
218.242.55.86 attackbots
Jul 10 19:47:32 MK-Soft-VM5 sshd\[12565\]: Invalid user xavier from 218.242.55.86 port 33544
Jul 10 19:47:32 MK-Soft-VM5 sshd\[12565\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.242.55.86
Jul 10 19:47:34 MK-Soft-VM5 sshd\[12565\]: Failed password for invalid user xavier from 218.242.55.86 port 33544 ssh2
...
2019-07-11 07:50:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.242.5.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3172
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.242.5.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 04:39:24 CST 2025
;; MSG SIZE  rcvd: 106
Host info
113.5.242.218.in-addr.arpa domain name pointer reserve.cableplus.com.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
113.5.242.218.in-addr.arpa	name = reserve.cableplus.com.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.92.63.3 attackspambots
Invalid user test from 34.92.63.3 port 38814
2020-04-21 15:31:17
222.186.42.136 attack
Fail2Ban Ban Triggered (2)
2020-04-21 16:05:18
49.234.93.93 attack
Apr 21 07:04:13 mail sshd\[3886\]: Invalid user git from 49.234.93.93
Apr 21 07:04:13 mail sshd\[3886\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.93.93
Apr 21 07:04:15 mail sshd\[3886\]: Failed password for invalid user git from 49.234.93.93 port 35820 ssh2
...
2020-04-21 15:59:24
60.250.147.218 attackspambots
SSH brute-force: detected 8 distinct usernames within a 24-hour window.
2020-04-21 15:36:52
73.93.232.206 attack
SSH bruteforce
2020-04-21 16:12:08
213.81.69.250 attack
trying to access non-authorized port
2020-04-21 15:34:31
190.145.70.202 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-21 15:37:27
69.194.8.237 attackbots
Invalid user postgres from 69.194.8.237 port 52000
2020-04-21 16:09:18
112.85.76.167 attackspambots
Unauthorized connection attempt detected from IP address 112.85.76.167 to port 23
2020-04-21 15:33:12
159.65.136.141 attackbotsspam
Invalid user tester from 159.65.136.141 port 53318
2020-04-21 15:55:33
114.67.82.150 attack
2020-04-21T08:54:57.794954vps773228.ovh.net sshd[14646]: Invalid user hadoop from 114.67.82.150 port 45390
2020-04-21T08:54:59.595871vps773228.ovh.net sshd[14646]: Failed password for invalid user hadoop from 114.67.82.150 port 45390 ssh2
2020-04-21T09:00:05.143847vps773228.ovh.net sshd[14744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.82.150  user=root
2020-04-21T09:00:06.881953vps773228.ovh.net sshd[14744]: Failed password for root from 114.67.82.150 port 53010 ssh2
2020-04-21T09:05:19.312603vps773228.ovh.net sshd[14824]: Invalid user pw from 114.67.82.150 port 60636
...
2020-04-21 15:38:31
129.28.151.149 attack
Apr 21 07:38:04 xeon sshd[11337]: Failed password for invalid user admin from 129.28.151.149 port 59354 ssh2
2020-04-21 15:54:38
181.63.248.149 attack
Apr 21 06:35:55 localhost sshd\[25256\]: Invalid user admin from 181.63.248.149 port 57792
Apr 21 06:35:55 localhost sshd\[25256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.63.248.149
Apr 21 06:35:57 localhost sshd\[25256\]: Failed password for invalid user admin from 181.63.248.149 port 57792 ssh2
...
2020-04-21 15:41:28
116.196.79.253 attack
Invalid user hd from 116.196.79.253 port 41626
2020-04-21 15:41:00
35.181.103.123 attackspam
WordPress /phpMyAdmin/
2020-04-21 16:12:26

Recently Reported IPs

37.106.240.37 176.63.238.43 190.139.101.201 171.128.208.32
80.9.163.176 227.25.212.56 226.23.174.70 146.206.106.48
153.209.110.185 236.183.219.46 13.13.20.133 127.135.97.174
236.222.34.235 218.196.32.140 163.174.14.71 55.185.51.133
5.253.252.144 234.174.120.247 26.9.107.142 53.49.150.68