Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.8.192.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30840
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.8.192.219.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 02:25:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 219.192.8.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.192.8.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.13.55 attackbotsspam
Jul  7 20:10:03 localhost sshd[15788]: Invalid user helena from 139.59.13.55 port 47677
Jul  7 20:10:03 localhost sshd[15788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.13.55
Jul  7 20:10:03 localhost sshd[15788]: Invalid user helena from 139.59.13.55 port 47677
Jul  7 20:10:05 localhost sshd[15788]: Failed password for invalid user helena from 139.59.13.55 port 47677 ssh2
Jul  7 20:13:36 localhost sshd[16211]: Invalid user dujoey from 139.59.13.55 port 46794
...
2020-07-08 05:49:30
186.121.202.2 attackbotsspam
$f2bV_matches
2020-07-08 05:45:35
179.61.14.7 attack
20 attempts against mh-ssh on flame
2020-07-08 05:43:52
222.186.190.17 attackspambots
Jul  7 22:30:23 rocket sshd[14289]: Failed password for root from 222.186.190.17 port 57947 ssh2
Jul  7 22:31:09 rocket sshd[14383]: Failed password for root from 222.186.190.17 port 35722 ssh2
...
2020-07-08 05:39:48
138.68.226.234 attackbotsspam
Jul  7 23:33:02 OPSO sshd\[16303\]: Invalid user keith from 138.68.226.234 port 34292
Jul  7 23:33:02 OPSO sshd\[16303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.226.234
Jul  7 23:33:04 OPSO sshd\[16303\]: Failed password for invalid user keith from 138.68.226.234 port 34292 ssh2
Jul  7 23:42:04 OPSO sshd\[18129\]: Invalid user toye from 138.68.226.234 port 42992
Jul  7 23:42:04 OPSO sshd\[18129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.226.234
2020-07-08 05:53:41
112.85.42.188 attackbots
07/07/2020-17:57:22.817723 112.85.42.188 Protocol: 6 ET SCAN Potential SSH Scan
2020-07-08 05:58:25
152.67.42.217 attackspam
Automatic report - Port Scan
2020-07-08 05:50:43
168.227.224.104 attack
failed_logins
2020-07-08 05:29:10
43.239.221.60 attack
Jul  7 22:10:28 ns382633 sshd\[15842\]: Invalid user chenjianyi from 43.239.221.60 port 58188
Jul  7 22:10:28 ns382633 sshd\[15842\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.239.221.60
Jul  7 22:10:30 ns382633 sshd\[15842\]: Failed password for invalid user chenjianyi from 43.239.221.60 port 58188 ssh2
Jul  7 22:13:25 ns382633 sshd\[16079\]: Invalid user yangtl from 43.239.221.60 port 45354
Jul  7 22:13:25 ns382633 sshd\[16079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.239.221.60
2020-07-08 06:00:57
171.220.243.179 attackbotsspam
Jul  7 23:23:10 abendstille sshd\[18968\]: Invalid user ronda from 171.220.243.179
Jul  7 23:23:10 abendstille sshd\[18968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.220.243.179
Jul  7 23:23:13 abendstille sshd\[18968\]: Failed password for invalid user ronda from 171.220.243.179 port 37534 ssh2
Jul  7 23:26:24 abendstille sshd\[22231\]: Invalid user zhaoweiyuan from 171.220.243.179
Jul  7 23:26:24 abendstille sshd\[22231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.220.243.179
...
2020-07-08 05:36:26
51.79.55.87 attackbots
Jul  7 23:44:04 OPSO sshd\[18431\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.55.87  user=postfix
Jul  7 23:44:05 OPSO sshd\[18431\]: Failed password for postfix from 51.79.55.87 port 43558 ssh2
Jul  7 23:49:08 OPSO sshd\[19648\]: Invalid user asuser from 51.79.55.87 port 41842
Jul  7 23:49:08 OPSO sshd\[19648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.79.55.87
Jul  7 23:49:10 OPSO sshd\[19648\]: Failed password for invalid user asuser from 51.79.55.87 port 41842 ssh2
2020-07-08 05:52:20
64.53.14.211 attackbots
2020-07-08T00:31:03.529754mail.standpoint.com.ua sshd[30304]: Invalid user ts from 64.53.14.211 port 52840
2020-07-08T00:31:03.532391mail.standpoint.com.ua sshd[30304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.yellowcabofcharleston.com
2020-07-08T00:31:03.529754mail.standpoint.com.ua sshd[30304]: Invalid user ts from 64.53.14.211 port 52840
2020-07-08T00:31:05.301898mail.standpoint.com.ua sshd[30304]: Failed password for invalid user ts from 64.53.14.211 port 52840 ssh2
2020-07-08T00:33:46.369109mail.standpoint.com.ua sshd[30652]: Invalid user xiongfen from 64.53.14.211 port 49418
...
2020-07-08 05:46:44
49.233.61.51 attackbots
20 attempts against mh-ssh on cloud
2020-07-08 06:01:29
192.99.13.88 attackbots
20 attempts against mh-misbehave-ban on wave
2020-07-08 05:37:35
109.255.185.65 attackspam
Jul  7 23:12:02 eventyay sshd[20709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.255.185.65
Jul  7 23:12:05 eventyay sshd[20709]: Failed password for invalid user rebeka from 109.255.185.65 port 48604 ssh2
Jul  7 23:17:17 eventyay sshd[20880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.255.185.65
...
2020-07-08 05:29:37

Recently Reported IPs

81.208.92.80 101.42.0.7 169.182.67.105 97.238.176.251
76.162.85.195 236.32.3.35 58.96.64.38 210.208.242.201
44.216.202.135 47.87.123.24 70.110.86.162 192.18.229.207
29.67.80.29 231.136.52.248 149.203.65.43 23.20.25.135
153.144.186.45 180.123.166.202 228.198.250.100 156.193.209.157