Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 242.81.112.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8937
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;242.81.112.19.			IN	A

;; AUTHORITY SECTION:
.			320	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060501 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 06 10:06:53 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 19.112.81.242.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 19.112.81.242.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.71.197.10 attackbots
Port scanning [2 denied]
2020-06-26 13:54:01
68.183.43.150 attackbotsspam
68.183.43.150 - - [26/Jun/2020:06:43:47 +0200] "GET /wp-login.php HTTP/1.1" 200 6310 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.43.150 - - [26/Jun/2020:06:43:49 +0200] "POST /wp-login.php HTTP/1.1" 200 6561 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
68.183.43.150 - - [26/Jun/2020:06:43:49 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-26 14:11:08
64.64.231.27 attackspam
Jun 26 03:55:09 vps1 sshd[1916215]: Invalid user shop from 64.64.231.27 port 43150
Jun 26 03:55:12 vps1 sshd[1916215]: Failed password for invalid user shop from 64.64.231.27 port 43150 ssh2
...
2020-06-26 13:55:16
164.132.107.245 attackbots
Invalid user test from 164.132.107.245 port 34124
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=245.ip-164-132-107.eu
Invalid user test from 164.132.107.245 port 34124
Failed password for invalid user test from 164.132.107.245 port 34124 ssh2
Invalid user dl from 164.132.107.245 port 34114
2020-06-26 14:20:09
182.139.134.107 attack
2020-06-26T04:48:36.256179shield sshd\[17894\]: Invalid user teamspeak3 from 182.139.134.107 port 54164
2020-06-26T04:48:36.259747shield sshd\[17894\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.139.134.107
2020-06-26T04:48:38.513810shield sshd\[17894\]: Failed password for invalid user teamspeak3 from 182.139.134.107 port 54164 ssh2
2020-06-26T04:51:38.328860shield sshd\[18832\]: Invalid user sms123 from 182.139.134.107 port 15425
2020-06-26T04:51:38.332620shield sshd\[18832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.139.134.107
2020-06-26 14:14:26
138.68.236.156 attack
138.68.236.156 - - [26/Jun/2020:05:47:19 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
138.68.236.156 - - [26/Jun/2020:06:11:42 +0200] "POST /xmlrpc.php HTTP/1.1" 403 613 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-26 13:52:53
1.1.243.236 attackbots
Unauthorised access (Jun 26) SRC=1.1.243.236 LEN=60 TTL=244 ID=18533 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-26 14:10:13
71.167.45.98 attackbots
Jun 26 04:44:08 localhost sshd\[25946\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.167.45.98  user=root
Jun 26 04:44:10 localhost sshd\[25946\]: Failed password for root from 71.167.45.98 port 11128 ssh2
Jun 26 05:34:09 localhost sshd\[26743\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.167.45.98  user=root
...
2020-06-26 14:07:38
182.61.164.198 attack
Jun 26 07:25:09 server sshd[20040]: Failed password for invalid user fabienne from 182.61.164.198 port 44650 ssh2
Jun 26 07:32:24 server sshd[27320]: Failed password for invalid user mic from 182.61.164.198 port 52161 ssh2
Jun 26 07:36:18 server sshd[31822]: Failed password for invalid user servidor1 from 182.61.164.198 port 41136 ssh2
2020-06-26 13:59:55
110.49.126.26 attackspambots
Icarus honeypot on github
2020-06-26 14:15:55
45.13.119.31 attack
Invalid user toni from 45.13.119.31 port 33762
2020-06-26 13:42:22
118.70.239.146 attackbotsspam
118.70.239.146 - - [26/Jun/2020:06:17:40 +0200] "POST /xmlrpc.php HTTP/1.1" 403 16470 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
118.70.239.146 - - [26/Jun/2020:06:18:28 +0200] "POST /xmlrpc.php HTTP/1.1" 403 16470 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-26 14:10:50
139.215.217.180 attackspam
2020-06-26T06:54:13.933983ns386461 sshd\[30912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180  user=root
2020-06-26T06:54:16.118041ns386461 sshd\[30912\]: Failed password for root from 139.215.217.180 port 46501 ssh2
2020-06-26T06:59:14.294313ns386461 sshd\[3009\]: Invalid user rachel from 139.215.217.180 port 39057
2020-06-26T06:59:14.299116ns386461 sshd\[3009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180
2020-06-26T06:59:16.802527ns386461 sshd\[3009\]: Failed password for invalid user rachel from 139.215.217.180 port 39057 ssh2
...
2020-06-26 13:40:49
54.38.36.210 attack
Invalid user katie from 54.38.36.210 port 48420
2020-06-26 13:53:22
47.254.47.223 attackbots
Automatic report - Banned IP Access
2020-06-26 13:51:09

Recently Reported IPs

109.166.52.141 140.128.205.24 114.16.195.9 32.59.169.15
185.69.144.226 60.78.166.237 108.14.63.53 104.133.90.158
165.110.56.188 155.16.137.123 165.5.13.116 200.148.25.86
12.169.200.164 194.33.195.2 4.135.194.150 19.58.171.14
32.119.125.86 75.255.99.28 140.1.186.51 207.68.55.108