Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 100.121.159.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34095
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;100.121.159.142.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082401 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 25 06:11:17 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 142.159.121.100.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 142.159.121.100.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.56.218 attackspambots
leo_www
2019-11-22 03:06:51
177.207.249.96 attackspambots
MAIL: User Login Brute Force Attempt
2019-11-22 02:56:32
85.25.246.122 attack
Invalid user Njoseg from 85.25.246.122 port 30472
2019-11-22 03:12:57
118.221.221.147 attack
port scan/probe/communication attempt; port 23
2019-11-22 02:55:49
185.143.223.184 attack
185.143.223.184 was recorded 12 times by 3 hosts attempting to connect to the following ports: 38396,38176,38357,38373,38790,38655,38613,38507,38415,38372,38594. Incident counter (4h, 24h, all-time): 12, 71, 198
2019-11-22 03:11:53
180.76.232.66 attack
Invalid user oxford from 180.76.232.66 port 44054
2019-11-22 02:36:44
132.232.23.12 attackspam
3x Failed Password
2019-11-22 02:38:08
71.217.8.27 attackbotsspam
Automatic report - Port Scan Attack
2019-11-22 03:11:28
128.199.199.113 attack
Nov 21 14:27:13 vps46666688 sshd[5312]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.199.113
Nov 21 14:27:15 vps46666688 sshd[5312]: Failed password for invalid user bhoothap from 128.199.199.113 port 51926 ssh2
...
2019-11-22 02:57:04
106.3.36.194 attack
Unauthorised access (Nov 21) SRC=106.3.36.194 LEN=40 TTL=240 ID=49091 TCP DPT=1433 WINDOW=1024 SYN
2019-11-22 02:29:13
36.225.87.45 attackbots
Fail2Ban Ban Triggered
2019-11-22 02:34:21
51.38.36.213 attackspambots
firewall-block, port(s): 8000/tcp
2019-11-22 02:42:29
118.193.31.181 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-22 02:57:37
45.82.35.95 attack
Postfix RBL failed
2019-11-22 02:33:53
64.213.148.59 attack
Nov 21 19:41:10 MK-Soft-VM7 sshd[5298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.213.148.59 
Nov 21 19:41:11 MK-Soft-VM7 sshd[5298]: Failed password for invalid user weblogic from 64.213.148.59 port 41642 ssh2
...
2019-11-22 03:00:22

Recently Reported IPs

52.130.230.84 181.193.97.28 90.220.219.30 36.33.115.17
100.190.88.39 182.224.15.54 179.236.238.208 123.103.147.58
200.16.75.50 243.159.174.222 118.89.30.90 175.238.103.90
134.73.76.164 83.58.212.151 84.119.164.147 62.234.106.199
98.137.241.54 71.172.111.132 120.19.170.65 139.59.44.223