Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.242.3.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53564
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.242.3.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 11:40:44 CST 2025
;; MSG SIZE  rcvd: 104
Host info
b'Host 12.3.242.33.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 33.242.3.12.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
193.70.43.220 attack
Feb  5 08:26:59 hpm sshd\[16218\]: Invalid user wn from 193.70.43.220
Feb  5 08:26:59 hpm sshd\[16218\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.ip-193-70-43.eu
Feb  5 08:27:01 hpm sshd\[16218\]: Failed password for invalid user wn from 193.70.43.220 port 36518 ssh2
Feb  5 08:30:04 hpm sshd\[16517\]: Invalid user salvini from 193.70.43.220
Feb  5 08:30:04 hpm sshd\[16517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.ip-193-70-43.eu
2020-02-06 02:38:09
221.231.126.43 attack
Feb  5 15:46:31 h1745522 sshd[23404]: Invalid user sakoda from 221.231.126.43 port 46642
Feb  5 15:46:31 h1745522 sshd[23404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.231.126.43
Feb  5 15:46:31 h1745522 sshd[23404]: Invalid user sakoda from 221.231.126.43 port 46642
Feb  5 15:46:33 h1745522 sshd[23404]: Failed password for invalid user sakoda from 221.231.126.43 port 46642 ssh2
Feb  5 15:49:17 h1745522 sshd[23506]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.231.126.43  user=root
Feb  5 15:49:19 h1745522 sshd[23506]: Failed password for root from 221.231.126.43 port 34112 ssh2
Feb  5 15:52:06 h1745522 sshd[23626]: Invalid user amssys from 221.231.126.43 port 49832
Feb  5 15:52:06 h1745522 sshd[23626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.231.126.43
Feb  5 15:52:06 h1745522 sshd[23626]: Invalid user amssys from 221.231.126.43 port 498
...
2020-02-06 02:45:22
54.37.67.144 attackspambots
SSH_scan
2020-02-06 03:15:43
159.89.165.127 attackspam
Feb  5 18:59:57 ns41 sshd[10351]: Failed password for root from 159.89.165.127 port 33650 ssh2
Feb  5 19:04:10 ns41 sshd[10927]: Failed password for root from 159.89.165.127 port 47662 ssh2
Feb  5 19:08:13 ns41 sshd[11096]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.165.127
2020-02-06 03:01:20
162.243.253.67 attackbotsspam
Feb  5 19:50:04 srv-ubuntu-dev3 sshd[72659]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.253.67  user=root
Feb  5 19:50:07 srv-ubuntu-dev3 sshd[72659]: Failed password for root from 162.243.253.67 port 60780 ssh2
Feb  5 19:54:40 srv-ubuntu-dev3 sshd[73095]: Invalid user kang from 162.243.253.67
Feb  5 19:54:40 srv-ubuntu-dev3 sshd[73095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.253.67
Feb  5 19:54:40 srv-ubuntu-dev3 sshd[73095]: Invalid user kang from 162.243.253.67
Feb  5 19:54:41 srv-ubuntu-dev3 sshd[73095]: Failed password for invalid user kang from 162.243.253.67 port 34611 ssh2
Feb  5 19:59:39 srv-ubuntu-dev3 sshd[73508]: Invalid user admin from 162.243.253.67
Feb  5 19:59:39 srv-ubuntu-dev3 sshd[73508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.243.253.67
Feb  5 19:59:39 srv-ubuntu-dev3 sshd[73508]: Invalid user admin from 1
...
2020-02-06 03:08:08
14.161.19.51 attack
Unauthorized connection attempt from IP address 14.161.19.51 on Port 445(SMB)
2020-02-06 02:35:58
182.253.253.31 attackspambots
Attempt to attack host OS, exploiting network vulnerabilities, on 05-02-2020 13:45:19.
2020-02-06 02:41:40
213.239.216.194 attackbotsspam
20 attempts against mh-misbehave-ban on cedar
2020-02-06 03:02:40
206.189.137.113 attack
SSH bruteforce (Triggered fail2ban)
2020-02-06 03:13:27
14.236.147.6 attackspam
Attempted to connect 2 times to port 22 TCP
2020-02-06 02:49:18
137.59.162.170 attackbots
Unauthorized connection attempt detected from IP address 137.59.162.170 to port 2220 [J]
2020-02-06 02:55:57
159.65.155.255 attackspam
Feb  3 05:27:33 finn sshd[12827]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255  user=r.r
Feb  3 05:27:35 finn sshd[12827]: Failed password for r.r from 159.65.155.255 port 49922 ssh2
Feb  3 05:27:35 finn sshd[12827]: Received disconnect from 159.65.155.255 port 49922:11: Bye Bye [preauth]
Feb  3 05:27:35 finn sshd[12827]: Disconnected from 159.65.155.255 port 49922 [preauth]
Feb  3 05:41:30 finn sshd[16373]: Invalid user ssie from 159.65.155.255 port 41206
Feb  3 05:41:30 finn sshd[16373]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.155.255
Feb  3 05:41:32 finn sshd[16373]: Failed password for invalid user ssie from 159.65.155.255 port 41206 ssh2
Feb  3 05:41:32 finn sshd[16373]: Received disconnect from 159.65.155.255 port 41206:11: Bye Bye [preauth]
Feb  3 05:41:32 finn sshd[16373]: Disconnected from 159.65.155.255 port 41206 [preauth]
Feb  3 05:43:51 finn sshd........
-------------------------------
2020-02-06 02:50:23
152.136.66.243 attack
Feb  5 06:34:21 sachi sshd\[22800\]: Invalid user rydin from 152.136.66.243
Feb  5 06:34:21 sachi sshd\[22800\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.66.243
Feb  5 06:34:22 sachi sshd\[22800\]: Failed password for invalid user rydin from 152.136.66.243 port 32972 ssh2
Feb  5 06:38:39 sachi sshd\[23138\]: Invalid user dorin from 152.136.66.243
Feb  5 06:38:39 sachi sshd\[23138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.66.243
2020-02-06 03:12:27
113.160.148.86 attackspambots
Brute forcing RDP port 3389
2020-02-06 02:35:30
139.162.90.220 attack
trying to access non-authorized port
2020-02-06 03:15:20

Recently Reported IPs

166.208.20.179 199.156.56.38 199.46.90.5 142.104.155.247
150.81.87.252 169.123.16.49 163.180.191.19 184.235.255.161
14.39.219.189 197.14.28.4 41.78.103.241 154.203.221.55
35.46.64.1 221.201.143.119 231.97.113.71 6.82.112.74
153.90.58.135 181.4.246.155 150.5.58.231 5.254.184.10