Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.189.20.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46541
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;69.189.20.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 00:47:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 242.20.189.69.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 242.20.189.69.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.37.185.151 attackbotsspam
Oct 22 20:15:37 odroid64 sshd\[30726\]: Invalid user nur from 104.37.185.151
Oct 22 20:15:37 odroid64 sshd\[30726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.37.185.151
Oct 22 20:15:39 odroid64 sshd\[30726\]: Failed password for invalid user nur from 104.37.185.151 port 50200 ssh2
...
2019-10-24 04:49:36
88.199.101.103 attackbotsspam
Oct 23 20:47:17 hcbbdb sshd\[11060\]: Invalid user rustserver from 88.199.101.103
Oct 23 20:47:17 hcbbdb sshd\[11060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88-199-101-103.static.vifnet.pl
Oct 23 20:47:18 hcbbdb sshd\[11060\]: Failed password for invalid user rustserver from 88.199.101.103 port 43782 ssh2
Oct 23 20:51:37 hcbbdb sshd\[11521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88-199-101-103.static.vifnet.pl  user=root
Oct 23 20:51:39 hcbbdb sshd\[11521\]: Failed password for root from 88.199.101.103 port 35304 ssh2
2019-10-24 04:59:46
104.168.248.96 attackspam
Oct 23 20:30:42 game-panel sshd[29499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.248.96
Oct 23 20:30:44 game-panel sshd[29499]: Failed password for invalid user kz from 104.168.248.96 port 53820 ssh2
Oct 23 20:37:19 game-panel sshd[29694]: Failed password for root from 104.168.248.96 port 36504 ssh2
2019-10-24 04:44:44
130.61.93.5 attack
2019-10-23T22:12:58.956973 server010.mediaedv.de sshd[17875]: Invalid user COMIDC from 130.61.93.5
2019-10-23T22:12:58.960422 server010.mediaedv.de sshd[17875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.93.5
2019-10-23T22:13:00.690931 server010.mediaedv.de sshd[17875]: Failed password for invalid user COMIDC from 130.61.93.5 port 58132 ssh2
2019-10-23T22:16:27.861060 server010.mediaedv.de sshd[18843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.93.5  user=r.r
2019-10-23T22:16:29.618066 server010.mediaedv.de sshd[18843]: Failed password for r.r from 130.61.93.5 port 42040 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=130.61.93.5
2019-10-24 05:01:32
31.131.108.41 attack
Fail2Ban Ban Triggered
2019-10-24 04:51:27
222.186.175.220 attackbots
Oct 21 20:27:52 microserver sshd[53313]: Failed none for root from 222.186.175.220 port 55298 ssh2
Oct 21 20:27:53 microserver sshd[53313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
Oct 21 20:27:56 microserver sshd[53313]: Failed password for root from 222.186.175.220 port 55298 ssh2
Oct 21 20:28:00 microserver sshd[53313]: Failed password for root from 222.186.175.220 port 55298 ssh2
Oct 21 20:28:04 microserver sshd[53313]: Failed password for root from 222.186.175.220 port 55298 ssh2
Oct 21 22:50:12 microserver sshd[7228]: Failed none for root from 222.186.175.220 port 6236 ssh2
Oct 21 22:50:13 microserver sshd[7228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.220  user=root
Oct 21 22:50:15 microserver sshd[7228]: Failed password for root from 222.186.175.220 port 6236 ssh2
Oct 21 22:50:19 microserver sshd[7228]: Failed password for root from 222.186.175.220 port 6236 ssh2
Oct 21
2019-10-24 04:25:17
182.114.202.250 attackspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/182.114.202.250/ 
 
 CN - 1H : (486)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4837 
 
 IP : 182.114.202.250 
 
 CIDR : 182.112.0.0/12 
 
 PREFIX COUNT : 1262 
 
 UNIQUE IP COUNT : 56665856 
 
 
 ATTACKS DETECTED ASN4837 :  
  1H - 6 
  3H - 14 
  6H - 32 
 12H - 78 
 24H - 140 
 
 DateTime : 2019-10-23 22:17:19 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-24 04:36:43
121.157.82.214 attackspambots
Oct 23 16:16:57 mail sshd\[8643\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.157.82.214  user=root
...
2019-10-24 04:55:03
111.93.4.174 attackspam
Automatic report - Banned IP Access
2019-10-24 04:32:34
34.73.254.71 attack
Oct 23 20:17:23 localhost sshd\[19443\]: Invalid user bill from 34.73.254.71 port 52444
Oct 23 20:17:23 localhost sshd\[19443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=34.73.254.71
Oct 23 20:17:25 localhost sshd\[19443\]: Failed password for invalid user bill from 34.73.254.71 port 52444 ssh2
...
2019-10-24 04:34:38
90.189.110.236 attackbots
Chat Spam
2019-10-24 04:50:40
119.29.12.122 attackspambots
Oct 23 10:48:14 php1 sshd\[31366\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.12.122  user=root
Oct 23 10:48:15 php1 sshd\[31366\]: Failed password for root from 119.29.12.122 port 51124 ssh2
Oct 23 10:52:50 php1 sshd\[31865\]: Invalid user park from 119.29.12.122
Oct 23 10:52:50 php1 sshd\[31865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.12.122
Oct 23 10:52:53 php1 sshd\[31865\]: Failed password for invalid user park from 119.29.12.122 port 59812 ssh2
2019-10-24 04:56:09
112.169.255.1 attack
Oct 22 18:25:05 odroid64 sshd\[26474\]: Invalid user support from 112.169.255.1
Oct 22 18:25:05 odroid64 sshd\[26474\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.255.1
Oct 22 18:25:06 odroid64 sshd\[26474\]: Failed password for invalid user support from 112.169.255.1 port 56604 ssh2
...
2019-10-24 04:46:09
118.163.193.82 attackspambots
Oct 22 11:30:46 odroid64 sshd\[9555\]: Invalid user user from 118.163.193.82
Oct 22 11:30:46 odroid64 sshd\[9555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.163.193.82
Oct 22 11:30:47 odroid64 sshd\[9555\]: Failed password for invalid user user from 118.163.193.82 port 50881 ssh2
...
2019-10-24 04:55:24
165.227.46.221 attackbots
Oct 23 10:36:16 tdfoods sshd\[20587\]: Invalid user 123 from 165.227.46.221
Oct 23 10:36:16 tdfoods sshd\[20587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=id.cast-soft.com
Oct 23 10:36:17 tdfoods sshd\[20587\]: Failed password for invalid user 123 from 165.227.46.221 port 48548 ssh2
Oct 23 10:41:24 tdfoods sshd\[21090\]: Invalid user locallocal from 165.227.46.221
Oct 23 10:41:24 tdfoods sshd\[21090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=id.cast-soft.com
2019-10-24 04:42:13

Recently Reported IPs

19.231.218.225 88.54.141.215 62.241.240.99 133.39.80.15
65.34.194.152 93.154.180.98 41.34.38.109 95.247.200.123
229.160.178.183 227.24.69.82 212.249.33.251 91.139.229.188
137.97.3.24 103.171.94.29 182.152.144.17 134.121.220.248
196.97.104.153 17.15.78.149 52.204.223.3 154.142.214.14