Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 68.242.133.218
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;68.242.133.218.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021201 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 03:24:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 218.133.242.68.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 218.133.242.68.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.13.139.163 attackbotsspam
Automatic report - Banned IP Access
2019-09-20 02:48:38
54.38.192.96 attack
Sep 19 17:36:52 dedicated sshd[19209]: Invalid user toto from 54.38.192.96 port 45084
2019-09-20 03:07:32
86.26.233.209 attackbotsspam
2019/09/19 12:47:03 [error] 1953#1953: *3735 open() "/srv/automx/instance/cgi-bin/ViewLog.asp" failed (2: No such file or directory), client: 86.26.233.209, server: autoconfig.tuxlinux.eu, request: "POST /cgi-bin/ViewLog.asp HTTP/1.1", host: "127.0.0.1"
2019/09/19 12:47:05 [error] 1950#1950: *3737 open() "/srv/automx/instance/cgi-bin/ViewLog.asp" failed (2: No such file or directory), client: 86.26.233.209, server: autoconfig.tuxlinux.eu, request: "POST /cgi-bin/ViewLog.asp HTTP/1.1", host: "127.0.0.1"
...
2019-09-20 02:51:32
58.210.96.156 attackbotsspam
Sep 19 20:47:22 vps647732 sshd[8597]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.210.96.156
Sep 19 20:47:24 vps647732 sshd[8597]: Failed password for invalid user fc from 58.210.96.156 port 48933 ssh2
...
2019-09-20 03:07:20
167.71.197.129 attackspambots
Sep 19 12:57:38 www_kotimaassa_fi sshd[31161]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.197.129
Sep 19 12:57:40 www_kotimaassa_fi sshd[31161]: Failed password for invalid user joe from 167.71.197.129 port 52670 ssh2
...
2019-09-20 03:10:21
49.83.139.209 attackspam
2019-09-19T12:46:03.219238lon01.zurich-datacenter.net sshd\[27712\]: Invalid user admin from 49.83.139.209 port 10423
2019-09-19T12:46:03.225034lon01.zurich-datacenter.net sshd\[27712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.83.139.209
2019-09-19T12:46:05.305874lon01.zurich-datacenter.net sshd\[27712\]: Failed password for invalid user admin from 49.83.139.209 port 10423 ssh2
2019-09-19T12:46:07.250218lon01.zurich-datacenter.net sshd\[27712\]: Failed password for invalid user admin from 49.83.139.209 port 10423 ssh2
2019-09-19T12:46:09.128241lon01.zurich-datacenter.net sshd\[27712\]: Failed password for invalid user admin from 49.83.139.209 port 10423 ssh2
...
2019-09-20 03:24:11
183.185.21.168 attackbotsspam
Bad bot requested remote resources
2019-09-20 03:05:30
201.184.110.154 attackspam
Sep 19 17:14:00 www sshd\[32570\]: Invalid user teste01 from 201.184.110.154Sep 19 17:14:02 www sshd\[32570\]: Failed password for invalid user teste01 from 201.184.110.154 port 39872 ssh2Sep 19 17:19:29 www sshd\[32592\]: Invalid user temp from 201.184.110.154Sep 19 17:19:31 www sshd\[32592\]: Failed password for invalid user temp from 201.184.110.154 port 34189 ssh2
...
2019-09-20 03:14:48
94.23.254.24 attack
Sep 19 12:46:09 vmanager6029 sshd\[29119\]: Invalid user manager from 94.23.254.24 port 58724
Sep 19 12:46:09 vmanager6029 sshd\[29119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.254.24
Sep 19 12:46:12 vmanager6029 sshd\[29119\]: Failed password for invalid user manager from 94.23.254.24 port 58724 ssh2
2019-09-20 03:19:53
83.166.155.190 attack
IP of recurrently spamvertising site: 3w.gross-schweiz.ch
Keeps sending spam despite unsubscription
2019-09-20 03:06:36
155.4.32.16 attack
Sep 19 08:47:01 lcdev sshd\[32696\]: Invalid user chef from 155.4.32.16
Sep 19 08:47:01 lcdev sshd\[32696\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=h-32-16.a182.priv.bahnhof.se
Sep 19 08:47:03 lcdev sshd\[32696\]: Failed password for invalid user chef from 155.4.32.16 port 60975 ssh2
Sep 19 08:51:20 lcdev sshd\[640\]: Invalid user gun from 155.4.32.16
Sep 19 08:51:20 lcdev sshd\[640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=h-32-16.a182.priv.bahnhof.se
2019-09-20 02:52:59
120.52.120.18 attackbotsspam
Sep 19 14:24:33 localhost sshd\[112822\]: Invalid user toku from 120.52.120.18 port 36919
Sep 19 14:24:33 localhost sshd\[112822\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.120.18
Sep 19 14:24:35 localhost sshd\[112822\]: Failed password for invalid user toku from 120.52.120.18 port 36919 ssh2
Sep 19 14:33:43 localhost sshd\[113144\]: Invalid user liprod from 120.52.120.18 port 59707
Sep 19 14:33:43 localhost sshd\[113144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.52.120.18
...
2019-09-20 02:57:30
201.93.142.111 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-19 10:12:58,669 INFO [amun_request_handler] PortScan Detected on Port: 445 (201.93.142.111)
2019-09-20 03:10:06
23.129.64.206 attack
Sep 19 17:50:48 thevastnessof sshd[17453]: Failed password for root from 23.129.64.206 port 58206 ssh2
...
2019-09-20 02:56:16
51.79.128.154 attack
proto=tcp  .  spt=51291  .  dpt=3389  .  src=51.79.128.154  .  dst=xx.xx.4.1  .     (listed on CINS badguys  Sep 19)     (1086)
2019-09-20 03:13:20

Recently Reported IPs

156.244.57.135 89.64.225.19 203.77.68.119 229.249.43.122
79.155.237.222 34.131.209.110 148.173.134.191 48.214.1.72
218.200.201.33 58.0.228.164 28.76.170.82 184.223.173.11
197.140.129.115 167.30.203.13 7.116.83.29 123.217.238.159
180.234.65.86 234.210.215.164 195.84.98.234 227.234.199.80