Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.141.69.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18603
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.141.69.134.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:35:29 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 134.69.141.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.69.141.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.248.175.232 attack
fail2ban
2019-09-28 06:47:39
103.5.150.16 attackbots
WordPress wp-login brute force :: 103.5.150.16 0.132 BYPASS [28/Sep/2019:07:38:22  1000] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3972 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-09-28 06:41:37
190.115.184.13 attackbots
Sep 27 12:03:06 hcbb sshd\[23885\]: Invalid user ritter from 190.115.184.13
Sep 27 12:03:06 hcbb sshd\[23885\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.115.184.13
Sep 27 12:03:08 hcbb sshd\[23885\]: Failed password for invalid user ritter from 190.115.184.13 port 36210 ssh2
Sep 27 12:10:05 hcbb sshd\[24546\]: Invalid user newtest from 190.115.184.13
Sep 27 12:10:05 hcbb sshd\[24546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.115.184.13
2019-09-28 06:15:44
43.229.84.117 attackspam
xmlrpc attack
2019-09-28 06:11:45
187.243.190.7 attack
Intento de hackeo
2019-09-28 06:26:39
132.232.19.14 attackspambots
Automated report - ssh fail2ban:
Sep 27 23:05:51 authentication failure 
Sep 27 23:05:53 wrong password, user=nicole, port=57792, ssh2
Sep 27 23:10:33 authentication failure
2019-09-28 06:12:09
114.100.101.33 attackspam
HTTP contact form spam
2019-09-28 06:41:21
45.80.65.82 attackbots
Sep 28 01:00:20 www sshd\[42822\]: Invalid user qd from 45.80.65.82Sep 28 01:00:22 www sshd\[42822\]: Failed password for invalid user qd from 45.80.65.82 port 43428 ssh2Sep 28 01:04:08 www sshd\[42977\]: Invalid user advani from 45.80.65.82
...
2019-09-28 06:15:13
46.105.112.107 attackbotsspam
Sep 27 23:57:42 vps647732 sshd[25938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.112.107
Sep 27 23:57:44 vps647732 sshd[25938]: Failed password for invalid user mlsmith from 46.105.112.107 port 42858 ssh2
...
2019-09-28 06:27:21
159.65.97.238 attackspambots
Sep 28 00:39:26 vps647732 sshd[26984]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.97.238
Sep 28 00:39:28 vps647732 sshd[26984]: Failed password for invalid user oms from 159.65.97.238 port 57796 ssh2
...
2019-09-28 06:40:26
110.183.111.33 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/110.183.111.33/ 
 CN - 1H : (1128)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 110.183.111.33 
 
 CIDR : 110.176.0.0/13 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 WYKRYTE ATAKI Z ASN4134 :  
  1H - 13 
  3H - 42 
  6H - 88 
 12H - 196 
 24H - 437 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-28 06:37:45
192.227.252.24 attack
Sep 27 23:00:39 microserver sshd[12531]: Invalid user cyrus from 192.227.252.24 port 33744
Sep 27 23:00:39 microserver sshd[12531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.24
Sep 27 23:00:41 microserver sshd[12531]: Failed password for invalid user cyrus from 192.227.252.24 port 33744 ssh2
Sep 27 23:04:48 microserver sshd[12806]: Invalid user autoroute from 192.227.252.24 port 45188
Sep 27 23:04:48 microserver sshd[12806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.24
Sep 27 23:30:07 microserver sshd[16655]: Invalid user yuan from 192.227.252.24 port 39910
Sep 27 23:30:07 microserver sshd[16655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.252.24
Sep 27 23:30:09 microserver sshd[16655]: Failed password for invalid user yuan from 192.227.252.24 port 39910 ssh2
Sep 27 23:34:11 microserver sshd[16993]: Invalid user webmaster from 192.227.252.24 p
2019-09-28 06:11:57
222.186.15.160 attack
Sep 27 18:22:28 TORMINT sshd\[12549\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.160  user=root
Sep 27 18:22:30 TORMINT sshd\[12549\]: Failed password for root from 222.186.15.160 port 34598 ssh2
Sep 27 18:31:20 TORMINT sshd\[12845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.160  user=root
...
2019-09-28 06:35:50
114.67.72.229 attackbotsspam
Sep 26 10:30:08 lvps87-230-18-107 sshd[20125]: Invalid user ai from 114.67.72.229
Sep 26 10:30:08 lvps87-230-18-107 sshd[20125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.72.229 
Sep 26 10:30:10 lvps87-230-18-107 sshd[20125]: Failed password for invalid user ai from 114.67.72.229 port 47896 ssh2
Sep 26 10:30:10 lvps87-230-18-107 sshd[20125]: Received disconnect from 114.67.72.229: 11: Bye Bye [preauth]
Sep 26 10:49:19 lvps87-230-18-107 sshd[20310]: Connection closed by 114.67.72.229 [preauth]
Sep 26 10:51:05 lvps87-230-18-107 sshd[20345]: Invalid user ni from 114.67.72.229
Sep 26 10:51:05 lvps87-230-18-107 sshd[20345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.72.229 
Sep 26 10:51:07 lvps87-230-18-107 sshd[20345]: Failed password for invalid user ni from 114.67.72.229 port 38832 ssh2
Sep 26 10:51:08 lvps87-230-18-107 sshd[20345]: Received disconnect from 114.67.72.2........
-------------------------------
2019-09-28 06:44:29
207.154.194.16 attackbots
Invalid user buck from 207.154.194.16 port 54060
2019-09-28 06:31:58

Recently Reported IPs

242.89.96.154 95.216.4.49 175.217.251.27 199.35.6.116
72.249.163.137 27.79.215.207 254.242.69.133 63.244.211.90
186.30.58.4 164.225.29.236 3.160.105.82 70.213.161.159
94.138.126.109 190.117.68.230 103.131.77.75 130.9.137.242
253.152.19.33 15.150.117.151 131.124.107.183 122.68.242.231