Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Czech Republic

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.248.142.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15620
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.248.142.122.		IN	A

;; AUTHORITY SECTION:
.			437	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022800 1800 900 604800 86400

;; Query time: 25 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 18:27:20 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 122.142.248.109.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 122.142.248.109.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
181.223.213.28 attackbots
2019-08-19T12:21:14.399104abusebot-3.cloudsearch.cf sshd\[32205\]: Invalid user sip from 181.223.213.28 port 52526
2019-08-19 22:28:00
148.70.223.115 attackbotsspam
Aug 19 12:21:43 eventyay sshd[18240]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.115
Aug 19 12:21:46 eventyay sshd[18240]: Failed password for invalid user grandma from 148.70.223.115 port 51768 ssh2
Aug 19 12:28:03 eventyay sshd[18497]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.223.115
...
2019-08-19 23:21:58
222.80.227.105 attack
SASL LOGIN
2019-08-19 22:43:10
196.43.178.1 attack
Aug 19 10:10:58 ny01 sshd[20740]: Failed password for root from 196.43.178.1 port 13880 ssh2
Aug 19 10:17:05 ny01 sshd[21322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.178.1
Aug 19 10:17:07 ny01 sshd[21322]: Failed password for invalid user nh from 196.43.178.1 port 33676 ssh2
2019-08-19 22:31:22
159.65.183.47 attackspambots
Aug 19 13:53:07 eventyay sshd[21953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.183.47
Aug 19 13:53:09 eventyay sshd[21953]: Failed password for invalid user amandabackup from 159.65.183.47 port 40554 ssh2
Aug 19 13:57:19 eventyay sshd[22088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.183.47
...
2019-08-19 23:15:05
51.255.174.164 attack
Aug 19 18:14:19 pkdns2 sshd\[13139\]: Invalid user edmund from 51.255.174.164Aug 19 18:14:21 pkdns2 sshd\[13139\]: Failed password for invalid user edmund from 51.255.174.164 port 51556 ssh2Aug 19 18:18:27 pkdns2 sshd\[13309\]: Invalid user thomas from 51.255.174.164Aug 19 18:18:29 pkdns2 sshd\[13309\]: Failed password for invalid user thomas from 51.255.174.164 port 40808 ssh2Aug 19 18:22:26 pkdns2 sshd\[13490\]: Invalid user ryan from 51.255.174.164Aug 19 18:22:28 pkdns2 sshd\[13490\]: Failed password for invalid user ryan from 51.255.174.164 port 58288 ssh2
...
2019-08-19 23:42:22
23.28.50.172 attack
Automatic report - Banned IP Access
2019-08-19 23:55:56
139.99.40.27 attackspambots
Aug 19 15:14:42 h2177944 sshd\[17059\]: Invalid user openproject from 139.99.40.27 port 32986
Aug 19 15:14:42 h2177944 sshd\[17059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.99.40.27
Aug 19 15:14:45 h2177944 sshd\[17059\]: Failed password for invalid user openproject from 139.99.40.27 port 32986 ssh2
Aug 19 15:19:26 h2177944 sshd\[17209\]: Invalid user FB from 139.99.40.27 port 50430
...
2019-08-19 22:28:40
106.248.41.245 attackspambots
Aug 19 04:55:26 web1 sshd\[23832\]: Invalid user oracle from 106.248.41.245
Aug 19 04:55:26 web1 sshd\[23832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.41.245
Aug 19 04:55:29 web1 sshd\[23832\]: Failed password for invalid user oracle from 106.248.41.245 port 56188 ssh2
Aug 19 05:00:28 web1 sshd\[24354\]: Invalid user flower from 106.248.41.245
Aug 19 05:00:28 web1 sshd\[24354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.248.41.245
2019-08-19 23:10:57
193.32.160.135 attackspambots
2019-08-19 17:04:03 H=\(\[193.32.160.135\]\) \[193.32.160.135\] sender verify fail for \: Unrouteable address
2019-08-19 17:04:03 H=\(\[193.32.160.135\]\) \[193.32.160.135\] F=\ rejected RCPT \: Sender verify failed
2019-08-19 17:04:03 H=\(\[193.32.160.135\]\) \[193.32.160.135\] F=\ rejected RCPT \: Sender verify failed
2019-08-19 17:04:03 H=\(\[193.32.160.135\]\) \[193.32.160.135\] F=\ rejected RCPT \: Sender verify failed
2019-08-19 17:04:03 H=\(\[193.32.160.135\]\) \[193.32.160.135\] F=\ rejected RCPT \: Sender verify failed
2019-08-19 17:04:03 H=\(\[193.32.160.135\]\) \[193.32.160.135\] F=\ rejected RCPT \: Sender verify failed
2019-08-19 17:04:03 H=\(\[193.32.160.135\]\) \[193.32.160.135\] F=\ rejecte
2019-08-19 23:11:29
191.53.222.59 attackspambots
$f2bV_matches
2019-08-19 23:28:42
109.184.229.116 attack
<a href=http://dsk-nn.ru>бытовки недорого</a>        - все это и многое другое можно узнать на сайте аренды и производства бытовок <a href=http://dsk-nn.ru>dsk-nn.ru</a>

--
Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/66.0.3359.181 Safari/537.36 Kinza/4.7.2
2019-08-19 23:30:17
148.247.102.222 attackspambots
Splunk® : Brute-Force login attempt on SSH:
Aug 19 10:48:02 testbed sshd[30075]: Disconnected from 148.247.102.222 port 49740 [preauth]
2019-08-19 23:17:57
85.37.38.195 attackbots
Aug 19 13:41:02 MK-Soft-Root1 sshd\[17864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.37.38.195  user=root
Aug 19 13:41:05 MK-Soft-Root1 sshd\[17864\]: Failed password for root from 85.37.38.195 port 17869 ssh2
Aug 19 13:45:26 MK-Soft-Root1 sshd\[18537\]: Invalid user tuser from 85.37.38.195 port 16313
Aug 19 13:45:26 MK-Soft-Root1 sshd\[18537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.37.38.195
...
2019-08-19 23:02:16
49.234.44.48 attack
Aug 19 10:34:08 debian sshd\[2432\]: Invalid user ts3server from 49.234.44.48 port 36976
Aug 19 10:34:08 debian sshd\[2432\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.44.48
Aug 19 10:34:10 debian sshd\[2432\]: Failed password for invalid user ts3server from 49.234.44.48 port 36976 ssh2
...
2019-08-19 23:34:03

Recently Reported IPs

109.248.14.72 109.248.142.184 109.248.142.160 109.248.142.249
109.248.142.222 109.248.142.67 109.248.143.169 109.248.140.115
109.248.143.16 109.248.143.173 109.248.15.123 109.248.143.63
109.248.143.25 109.248.15.13 109.248.15.93 109.248.150.6
109.248.156.29 109.248.166.99 109.248.156.48 109.248.156.55