Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nantou City

Region: Nantou

Country: Taiwan, China

Internet Service Provider: Chunghwa

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.168.46.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48932
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.168.46.142.			IN	A

;; AUTHORITY SECTION:
.			173	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022202 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 23 09:41:33 CST 2022
;; MSG SIZE  rcvd: 105
Host info
142.46.168.1.in-addr.arpa domain name pointer 1-168-46-142.dynamic-ip.hinet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.46.168.1.in-addr.arpa	name = 1-168-46-142.dynamic-ip.hinet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
146.120.17.141 attackspambots
3389BruteforceFW22
2019-10-10 16:16:53
81.28.107.30 attackbots
2019-10-10T05:50:07.943493stark.klein-stark.info postfix/smtpd\[5417\]: NOQUEUE: reject: RCPT from longing.stop-snore-de.com\[81.28.107.30\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\
...
2019-10-10 15:41:59
124.74.248.218 attackspambots
$f2bV_matches
2019-10-10 15:59:09
109.158.236.168 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/109.158.236.168/ 
 GB - 1H : (76)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GB 
 NAME ASN : ASN2856 
 
 IP : 109.158.236.168 
 
 CIDR : 109.144.0.0/12 
 
 PREFIX COUNT : 292 
 
 UNIQUE IP COUNT : 10658560 
 
 
 WYKRYTE ATAKI Z ASN2856 :  
  1H - 3 
  3H - 4 
  6H - 6 
 12H - 8 
 24H - 11 
 
 DateTime : 2019-10-10 05:49:52 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-10 15:51:53
106.12.12.7 attackbotsspam
Oct 10 09:51:29 [munged] sshd[29004]: Failed password for root from 106.12.12.7 port 52860 ssh2
2019-10-10 16:13:04
54.36.126.81 attack
Oct 10 08:03:48 SilenceServices sshd[26062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.126.81
Oct 10 08:03:50 SilenceServices sshd[26062]: Failed password for invalid user Pass@2018 from 54.36.126.81 port 9904 ssh2
Oct 10 08:07:25 SilenceServices sshd[26982]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.126.81
2019-10-10 16:04:51
221.181.24.246 attackbots
Oct 10 06:44:59 raspberrypi sshd\[15092\]: Invalid user support from 221.181.24.246Oct 10 06:45:01 raspberrypi sshd\[15092\]: Failed password for invalid user support from 221.181.24.246 port 53302 ssh2Oct 10 06:45:03 raspberrypi sshd\[15099\]: Invalid user ubnt from 221.181.24.246
...
2019-10-10 16:05:16
167.114.55.84 attack
Oct 10 06:12:35 herz-der-gamer sshd[27270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.55.84  user=root
Oct 10 06:12:37 herz-der-gamer sshd[27270]: Failed password for root from 167.114.55.84 port 43502 ssh2
Oct 10 06:26:13 herz-der-gamer sshd[27591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.114.55.84  user=root
Oct 10 06:26:15 herz-der-gamer sshd[27591]: Failed password for root from 167.114.55.84 port 54524 ssh2
...
2019-10-10 15:44:20
192.99.151.33 attackbotsspam
Oct  6 16:16:51 new sshd[16389]: Failed password for r.r from 192.99.151.33 port 56734 ssh2
Oct  6 16:16:51 new sshd[16389]: Received disconnect from 192.99.151.33: 11: Bye Bye [preauth]
Oct  6 16:26:58 new sshd[19018]: Failed password for r.r from 192.99.151.33 port 41630 ssh2
Oct  6 16:26:59 new sshd[19018]: Received disconnect from 192.99.151.33: 11: Bye Bye [preauth]
Oct  6 16:30:56 new sshd[20151]: Failed password for r.r from 192.99.151.33 port 53996 ssh2
Oct  6 16:30:57 new sshd[20151]: Received disconnect from 192.99.151.33: 11: Bye Bye [preauth]
Oct  6 16:34:59 new sshd[21260]: Failed password for r.r from 192.99.151.33 port 38254 ssh2
Oct  6 16:34:59 new sshd[21260]: Received disconnect from 192.99.151.33: 11: Bye Bye [preauth]
Oct  6 16:38:49 new sshd[22032]: Failed password for r.r from 192.99.151.33 port 50614 ssh2
Oct  6 16:38:49 new sshd[22032]: Received disconnect from 192.99.151.33: 11: Bye Bye [preauth]
Oct  6 16:42:51 new sshd[23214]: Failed password ........
-------------------------------
2019-10-10 15:39:15
80.47.49.99 attackbotsspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/80.47.49.99/ 
 GB - 1H : (75)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GB 
 NAME ASN : ASN9105 
 
 IP : 80.47.49.99 
 
 CIDR : 80.40.0.0/13 
 
 PREFIX COUNT : 42 
 
 UNIQUE IP COUNT : 3022848 
 
 
 WYKRYTE ATAKI Z ASN9105 :  
  1H - 2 
  3H - 3 
  6H - 5 
 12H - 6 
 24H - 11 
 
 DateTime : 2019-10-10 05:49:16 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-10 16:15:55
185.224.137.123 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/185.224.137.123/ 
 NL - 1H : (37)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : NL 
 NAME ASN : ASN47583 
 
 IP : 185.224.137.123 
 
 CIDR : 185.224.136.0/22 
 
 PREFIX COUNT : 95 
 
 UNIQUE IP COUNT : 45056 
 
 
 WYKRYTE ATAKI Z ASN47583 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-10 05:49:50 
 
 INFO : SERVER - Looking for resource vulnerabilities Detected and Blocked by ADMIN  - data recovery
2019-10-10 15:53:14
49.232.41.123 attackspam
Oct  6 12:02:06 pi01 sshd[25240]: Connection from 49.232.41.123 port 51402 on 192.168.1.10 port 22
Oct  6 12:02:08 pi01 sshd[25240]: User r.r from 49.232.41.123 not allowed because not listed in AllowUsers
Oct  6 12:02:08 pi01 sshd[25240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.41.123  user=r.r
Oct  6 12:02:10 pi01 sshd[25240]: Failed password for invalid user r.r from 49.232.41.123 port 51402 ssh2
Oct  6 12:02:11 pi01 sshd[25240]: Received disconnect from 49.232.41.123 port 51402:11: Bye Bye [preauth]
Oct  6 12:02:11 pi01 sshd[25240]: Disconnected from 49.232.41.123 port 51402 [preauth]
Oct  6 12:14:23 pi01 sshd[25454]: Connection from 49.232.41.123 port 46738 on 192.168.1.10 port 22
Oct  6 12:14:40 pi01 sshd[25454]: Connection closed by 49.232.41.123 port 46738 [preauth]
Oct  6 12:18:36 pi01 sshd[25490]: Connection from 49.232.41.123 port 42484 on 192.168.1.10 port 22
Oct  6 12:18:38 pi01 sshd[25490]: User r.r fr........
-------------------------------
2019-10-10 15:41:11
189.211.84.83 attackspam
Automatic report - Port Scan Attack
2019-10-10 15:40:00
81.28.107.235 attack
Autoban   81.28.107.235 AUTH/CONNECT
2019-10-10 16:05:46
182.241.87.223 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/182.241.87.223/ 
 CN - 1H : (515)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : CN 
 NAME ASN : ASN4134 
 
 IP : 182.241.87.223 
 
 CIDR : 182.241.0.0/16 
 
 PREFIX COUNT : 5430 
 
 UNIQUE IP COUNT : 106919680 
 
 
 WYKRYTE ATAKI Z ASN4134 :  
  1H - 15 
  3H - 40 
  6H - 69 
 12H - 117 
 24H - 230 
 
 DateTime : 2019-10-10 05:49:16 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-10 16:15:21

Recently Reported IPs

26.238.24.7 176.40.10.152 219.9.177.89 23.254.1.149
204.250.232.210 163.128.67.31 247.33.168.221 240.188.91.227
223.57.81.199 190.80.160.229 25.165.119.18 104.124.129.84
143.6.77.35 110.175.200.244 41.87.65.144 19.91.220.2
237.101.176.47 51.192.44.121 148.229.155.199 145.44.219.65