Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 64.226.12.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34313
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;64.226.12.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022301 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 08:43:44 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'242.12.226.64.in-addr.arpa has no PTR record
'
Nslookup info:
b'
Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
54.38.241.171 attackspambots
5x Failed Password
2020-04-04 10:11:08
162.243.130.25 attack
1962/tcp 9160/tcp 111/udp...
[2020-02-02/04-03]29pkt,22pt.(tcp),2pt.(udp)
2020-04-04 10:06:22
188.226.167.212 attackspambots
Apr  4 05:59:27 ks10 sshd[2406282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.167.212 
Apr  4 05:59:29 ks10 sshd[2406282]: Failed password for invalid user liup from 188.226.167.212 port 40790 ssh2
...
2020-04-04 12:08:13
68.183.219.43 attack
Mar 30 11:19:03 prox sshd[2571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.219.43 
Mar 30 11:19:05 prox sshd[2571]: Failed password for invalid user kuz from 68.183.219.43 port 38688 ssh2
2020-04-04 10:01:32
162.243.132.26 attackbots
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2020-04-04 10:04:10
123.135.127.85 attackbots
54321/tcp 12345/tcp 22222/tcp...
[2020-02-02/04-03]218pkt,11pt.(tcp)
2020-04-04 10:00:41
51.81.124.187 attackspam
Fail2Ban Ban Triggered
2020-04-04 10:22:31
112.85.42.173 attackbotsspam
Apr  3 18:02:48 php1 sshd\[14892\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.173  user=root
Apr  3 18:02:50 php1 sshd\[14892\]: Failed password for root from 112.85.42.173 port 25530 ssh2
Apr  3 18:02:54 php1 sshd\[14892\]: Failed password for root from 112.85.42.173 port 25530 ssh2
Apr  3 18:02:58 php1 sshd\[14892\]: Failed password for root from 112.85.42.173 port 25530 ssh2
Apr  3 18:03:01 php1 sshd\[14892\]: Failed password for root from 112.85.42.173 port 25530 ssh2
2020-04-04 12:05:34
114.88.128.78 attack
Apr  4 05:57:24 ns392434 sshd[26212]: Invalid user grc from 114.88.128.78 port 60678
Apr  4 05:57:24 ns392434 sshd[26212]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.88.128.78
Apr  4 05:57:24 ns392434 sshd[26212]: Invalid user grc from 114.88.128.78 port 60678
Apr  4 05:57:26 ns392434 sshd[26212]: Failed password for invalid user grc from 114.88.128.78 port 60678 ssh2
Apr  4 06:10:09 ns392434 sshd[26679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.88.128.78  user=root
Apr  4 06:10:12 ns392434 sshd[26679]: Failed password for root from 114.88.128.78 port 34752 ssh2
Apr  4 06:13:50 ns392434 sshd[26800]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.88.128.78  user=root
Apr  4 06:13:51 ns392434 sshd[26800]: Failed password for root from 114.88.128.78 port 45314 ssh2
Apr  4 06:16:53 ns392434 sshd[26917]: Invalid user ilyuko from 114.88.128.78 port 55878
2020-04-04 12:19:14
91.207.175.154 attackspam
3306/tcp 22/tcp 1900/tcp...
[2020-02-03/04-03]53pkt,12pt.(tcp),4pt.(udp)
2020-04-04 10:04:52
106.13.184.139 attackbots
5x Failed Password
2020-04-04 12:15:30
110.43.208.237 attackbots
" "
2020-04-04 10:24:10
148.70.178.70 attackbotsspam
$f2bV_matches
2020-04-04 10:29:11
221.165.252.143 attack
Apr  4 06:49:52 hosting sshd[10218]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.165.252.143  user=root
Apr  4 06:49:54 hosting sshd[10218]: Failed password for root from 221.165.252.143 port 42186 ssh2
Apr  4 06:55:04 hosting sshd[10879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.165.252.143  user=root
Apr  4 06:55:05 hosting sshd[10879]: Failed password for root from 221.165.252.143 port 33846 ssh2
Apr  4 06:59:33 hosting sshd[11611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.165.252.143  user=root
Apr  4 06:59:34 hosting sshd[11611]: Failed password for root from 221.165.252.143 port 44972 ssh2
...
2020-04-04 12:03:56
181.47.187.229 attackbotsspam
Apr  4 06:54:22 pkdns2 sshd\[51634\]: Invalid user tf from 181.47.187.229Apr  4 06:54:24 pkdns2 sshd\[51634\]: Failed password for invalid user tf from 181.47.187.229 port 33180 ssh2Apr  4 06:57:02 pkdns2 sshd\[51739\]: Invalid user Aimee from 181.47.187.229Apr  4 06:57:05 pkdns2 sshd\[51739\]: Failed password for invalid user Aimee from 181.47.187.229 port 36012 ssh2Apr  4 06:59:36 pkdns2 sshd\[51837\]: Invalid user yamaken from 181.47.187.229Apr  4 06:59:38 pkdns2 sshd\[51837\]: Failed password for invalid user yamaken from 181.47.187.229 port 38850 ssh2
...
2020-04-04 12:01:26

Recently Reported IPs

140.70.88.5 108.254.65.37 170.98.200.68 131.172.86.94
87.132.135.106 208.111.194.188 24.207.1.21 13.213.126.235
64.28.137.181 233.70.88.103 236.64.120.136 243.112.30.18
57.195.166.182 171.98.110.151 31.16.165.88 244.162.70.56
164.54.177.16 252.8.228.94 71.127.244.180 84.27.27.74