Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.142.189.16
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34780
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.142.189.16.			IN	A

;; AUTHORITY SECTION:
.			400	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 162 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 05:33:22 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 16.189.142.1.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 16.189.142.1.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
188.234.247.110 attackbots
(sshd) Failed SSH login from 188.234.247.110 (RU/Russia/net247.234.188-110.ertelecom.ru): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 31 08:18:46 ubnt-55d23 sshd[3581]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.234.247.110  user=root
May 31 08:18:49 ubnt-55d23 sshd[3581]: Failed password for root from 188.234.247.110 port 55238 ssh2
2020-05-31 19:54:16
183.166.21.101 attack
May 31 05:45:05 srv01 postfix/smtpd\[689\]: warning: unknown\[183.166.21.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 31 05:45:12 srv01 postfix/smtpd\[12958\]: warning: unknown\[183.166.21.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 31 05:45:23 srv01 postfix/smtpd\[689\]: warning: unknown\[183.166.21.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 31 05:45:39 srv01 postfix/smtpd\[13425\]: warning: unknown\[183.166.21.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
May 31 05:45:47 srv01 postfix/smtpd\[689\]: warning: unknown\[183.166.21.101\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-05-31 20:02:03
45.55.180.7 attackspam
SSH Brute-Force reported by Fail2Ban
2020-05-31 19:53:53
183.77.184.61 attackspambots
Honeypot attack, port: 445, PTR: ac184061.dynamic.ppp.asahi-net.or.jp.
2020-05-31 19:37:21
51.178.17.63 attack
May 31 04:41:24 dignus sshd[32568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.17.63
May 31 04:41:26 dignus sshd[32568]: Failed password for invalid user admin from 51.178.17.63 port 38542 ssh2
May 31 04:44:55 dignus sshd[1369]: Invalid user chiuan from 51.178.17.63 port 44752
May 31 04:44:55 dignus sshd[1369]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.178.17.63
May 31 04:44:57 dignus sshd[1369]: Failed password for invalid user chiuan from 51.178.17.63 port 44752 ssh2
...
2020-05-31 20:02:23
176.31.252.148 attackspambots
<6 unauthorized SSH connections
2020-05-31 19:54:42
116.24.33.94 attackspam
Unauthorized connection attempt from IP address 116.24.33.94 on Port 445(SMB)
2020-05-31 20:06:20
45.46.222.55 attack
Unauthorized connection attempt detected from IP address 45.46.222.55 to port 80
2020-05-31 19:31:55
184.154.74.66 attack
Unauthorized connection attempt detected from IP address 184.154.74.66 to port 53
2020-05-31 19:45:00
106.13.183.215 attackbotsspam
(sshd) Failed SSH login from 106.13.183.215 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 31 13:51:52 srv sshd[3410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.183.215  user=root
May 31 13:51:55 srv sshd[3410]: Failed password for root from 106.13.183.215 port 33306 ssh2
May 31 13:55:20 srv sshd[3443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.183.215  user=root
May 31 13:55:22 srv sshd[3443]: Failed password for root from 106.13.183.215 port 40804 ssh2
May 31 13:57:43 srv sshd[3482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.183.215  user=root
2020-05-31 19:51:11
139.186.73.162 attack
May 31 12:57:25 ns382633 sshd\[4107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.73.162  user=root
May 31 12:57:27 ns382633 sshd\[4107\]: Failed password for root from 139.186.73.162 port 56934 ssh2
May 31 13:10:35 ns382633 sshd\[6807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.73.162  user=root
May 31 13:10:38 ns382633 sshd\[6807\]: Failed password for root from 139.186.73.162 port 33966 ssh2
May 31 13:14:49 ns382633 sshd\[7133\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.186.73.162  user=root
2020-05-31 19:57:53
180.76.140.251 attackbotsspam
May 29 03:18:54 clarabelen sshd[2337]: Invalid user sammy from 180.76.140.251
May 29 03:18:54 clarabelen sshd[2337]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.140.251 
May 29 03:18:57 clarabelen sshd[2337]: Failed password for invalid user sammy from 180.76.140.251 port 48812 ssh2
May 29 03:18:57 clarabelen sshd[2337]: Received disconnect from 180.76.140.251: 11: Bye Bye [preauth]
May 29 03:35:07 clarabelen sshd[3288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.140.251  user=r.r
May 29 03:35:09 clarabelen sshd[3288]: Failed password for r.r from 180.76.140.251 port 60036 ssh2
May 29 03:35:09 clarabelen sshd[3288]: Received disconnect from 180.76.140.251: 11: Bye Bye [preauth]
May 29 03:38:53 clarabelen sshd[3529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.140.251  user=r.r
May 29 03:38:55 clarabelen sshd[3529]: Fai........
-------------------------------
2020-05-31 19:38:39
36.108.170.176 attackspambots
May 31 12:26:21 electroncash sshd[6688]: Failed password for root from 36.108.170.176 port 38091 ssh2
May 31 12:29:42 electroncash sshd[7627]: Invalid user www2 from 36.108.170.176 port 51738
May 31 12:29:42 electroncash sshd[7627]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.108.170.176 
May 31 12:29:42 electroncash sshd[7627]: Invalid user www2 from 36.108.170.176 port 51738
May 31 12:29:43 electroncash sshd[7627]: Failed password for invalid user www2 from 36.108.170.176 port 51738 ssh2
...
2020-05-31 19:31:30
89.134.126.89 attackspambots
May 31 07:12:35 firewall sshd[23958]: Invalid user test from 89.134.126.89
May 31 07:12:36 firewall sshd[23958]: Failed password for invalid user test from 89.134.126.89 port 42664 ssh2
May 31 07:16:13 firewall sshd[24075]: Invalid user sale from 89.134.126.89
...
2020-05-31 19:42:24
117.51.142.192 attackbots
Invalid user stream from 117.51.142.192 port 40060
2020-05-31 19:45:19

Recently Reported IPs

1.139.37.87 1.138.163.26 1.142.191.143 1.137.41.193
1.137.229.231 1.139.36.237 1.139.206.35 1.137.77.125
1.136.104.102 1.138.174.12 1.136.186.120 1.141.117.229
1.136.73.79 1.14.116.35 1.136.205.248 1.137.66.165
0.50.234.147 0.51.155.149 1.139.41.100 1.139.186.212