Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.138.131.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58092
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.138.131.11.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 00:11:17 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 11.131.138.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 11.131.138.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
153.36.236.35 attackspambots
Jul 27 08:05:20 minden010 sshd[19455]: Failed password for root from 153.36.236.35 port 18549 ssh2
Jul 27 08:05:22 minden010 sshd[19455]: Failed password for root from 153.36.236.35 port 18549 ssh2
Jul 27 08:05:25 minden010 sshd[19455]: Failed password for root from 153.36.236.35 port 18549 ssh2
...
2019-07-27 14:08:51
185.53.88.22 attackspam
\[2019-07-27 01:40:22\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-27T01:40:22.494-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441144630211",SessionID="0x7ff4d00a7228",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/61048",ACLName="no_extension_match"
\[2019-07-27 01:41:54\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-27T01:41:54.045-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9441144630211",SessionID="0x7ff4d05151f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/51970",ACLName="no_extension_match"
\[2019-07-27 01:43:37\] SECURITY\[2326\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-27T01:43:37.682-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441144630211",SessionID="0x7ff4d07c2178",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/54946",ACLName="no_extensi
2019-07-27 13:53:11
200.27.18.242 attack
proto=tcp  .  spt=51980  .  dpt=25  .     (listed on Blocklist de  Jul 26)     (277)
2019-07-27 14:18:05
112.85.42.89 attack
Jul 27 08:12:44 dcd-gentoo sshd[23868]: User root from 112.85.42.89 not allowed because none of user's groups are listed in AllowGroups
Jul 27 08:12:48 dcd-gentoo sshd[23868]: error: PAM: Authentication failure for illegal user root from 112.85.42.89
Jul 27 08:12:44 dcd-gentoo sshd[23868]: User root from 112.85.42.89 not allowed because none of user's groups are listed in AllowGroups
Jul 27 08:12:48 dcd-gentoo sshd[23868]: error: PAM: Authentication failure for illegal user root from 112.85.42.89
Jul 27 08:12:44 dcd-gentoo sshd[23868]: User root from 112.85.42.89 not allowed because none of user's groups are listed in AllowGroups
Jul 27 08:12:48 dcd-gentoo sshd[23868]: error: PAM: Authentication failure for illegal user root from 112.85.42.89
Jul 27 08:12:48 dcd-gentoo sshd[23868]: Failed keyboard-interactive/pam for invalid user root from 112.85.42.89 port 38595 ssh2
...
2019-07-27 14:14:41
218.92.0.204 attack
2019-07-27T06:17:55.209077abusebot-6.cloudsearch.cf sshd\[27824\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
2019-07-27 14:34:04
113.57.95.12 attack
2019-07-27T05:54:05.301042abusebot-5.cloudsearch.cf sshd\[21034\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.57.95.12  user=root
2019-07-27 13:56:06
198.108.67.18 attack
proto=tcp  .  spt=34366  .  dpt=25  .     (listed on CINS badguys  Jul 27)     (285)
2019-07-27 13:57:38
193.112.4.12 attackbotsspam
Jul 27 06:31:06 localhost sshd\[50552\]: Invalid user hsb from 193.112.4.12 port 48848
Jul 27 06:31:06 localhost sshd\[50552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.4.12
Jul 27 06:31:07 localhost sshd\[50552\]: Failed password for invalid user hsb from 193.112.4.12 port 48848 ssh2
Jul 27 06:36:37 localhost sshd\[50709\]: Invalid user S\#d885fk9981g from 193.112.4.12 port 43056
Jul 27 06:36:37 localhost sshd\[50709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.4.12
...
2019-07-27 14:47:27
181.41.98.17 attackbotsspam
TCP Port: 25 _    invalid blocked abuseat-org barracudacentral _  _  _ _ (266)
2019-07-27 14:41:12
218.92.0.143 attack
Jul 27 07:14:07 tux-35-217 sshd\[11993\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.143  user=root
Jul 27 07:14:09 tux-35-217 sshd\[11993\]: Failed password for root from 218.92.0.143 port 5954 ssh2
Jul 27 07:14:13 tux-35-217 sshd\[11993\]: Failed password for root from 218.92.0.143 port 5954 ssh2
Jul 27 07:14:15 tux-35-217 sshd\[11993\]: Failed password for root from 218.92.0.143 port 5954 ssh2
...
2019-07-27 14:16:39
34.200.140.44 attackbotsspam
Jul 27 06:14:17 MK-Soft-VM3 sshd\[24642\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.200.140.44  user=root
Jul 27 06:14:19 MK-Soft-VM3 sshd\[24642\]: Failed password for root from 34.200.140.44 port 49372 ssh2
Jul 27 06:20:10 MK-Soft-VM3 sshd\[24917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.200.140.44  user=root
...
2019-07-27 14:33:38
80.82.70.118 attackbots
27.07.2019 06:07:55 Connection to port 10001 blocked by firewall
2019-07-27 14:42:39
132.148.152.198 attack
xmlrpc attack
2019-07-27 14:51:34
121.162.131.223 attackspambots
Jul 27 01:09:25 xtremcommunity sshd\[953\]: Invalid user jessy from 121.162.131.223 port 57015
Jul 27 01:09:25 xtremcommunity sshd\[953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.131.223
Jul 27 01:09:27 xtremcommunity sshd\[953\]: Failed password for invalid user jessy from 121.162.131.223 port 57015 ssh2
Jul 27 01:14:28 xtremcommunity sshd\[1064\]: Invalid user agata from 121.162.131.223 port 54068
Jul 27 01:14:28 xtremcommunity sshd\[1064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.162.131.223
...
2019-07-27 14:05:56
59.125.120.118 attack
Jul 27 05:09:46 MK-Soft-VM5 sshd\[29085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.120.118  user=root
Jul 27 05:09:48 MK-Soft-VM5 sshd\[29085\]: Failed password for root from 59.125.120.118 port 61943 ssh2
Jul 27 05:14:42 MK-Soft-VM5 sshd\[29136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.125.120.118  user=root
...
2019-07-27 13:54:12

Recently Reported IPs

208.181.148.152 57.164.111.170 18.24.133.106 215.253.198.233
226.130.87.215 109.241.148.45 164.101.164.15 121.107.227.174
240.168.182.178 135.100.245.141 139.144.244.127 33.254.199.123
61.192.19.44 241.171.186.35 239.46.36.50 22.224.158.18
56.231.141.183 220.222.79.191 130.121.46.162 206.147.231.95