Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.147.145.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17141
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.147.145.142.		IN	A

;; AUTHORITY SECTION:
.			16	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 08:17:11 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 142.145.147.112.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.145.147.112.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.58.160.95 attackbotsspam
Spam Timestamp : 08-Sep-19 08:24   BlockList Provider  combined abuse   (737)
2019-09-08 22:31:22
185.39.183.66 attack
445/tcp
[2019-09-08]1pkt
2019-09-08 22:32:31
5.196.225.45 attack
Sep  8 08:57:11 aat-srv002 sshd[14822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.225.45
Sep  8 08:57:13 aat-srv002 sshd[14822]: Failed password for invalid user bot123 from 5.196.225.45 port 42844 ssh2
Sep  8 09:00:48 aat-srv002 sshd[14946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.225.45
Sep  8 09:00:49 aat-srv002 sshd[14946]: Failed password for invalid user test123 from 5.196.225.45 port 56452 ssh2
...
2019-09-08 22:20:48
190.43.79.10 attackspam
Autoban   190.43.79.10 AUTH/CONNECT
2019-09-08 22:35:40
109.96.29.70 attackbotsspam
Spam Timestamp : 08-Sep-19 08:26   BlockList Provider  combined abuse   (741)
2019-09-08 22:26:54
37.187.4.149 attackbotsspam
$f2bV_matches
2019-09-08 22:29:35
104.254.244.205 attack
Sep  8 10:23:53 mail1 sshd\[22508\]: Invalid user ts3server from 104.254.244.205 port 43162
Sep  8 10:23:53 mail1 sshd\[22508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.254.244.205
Sep  8 10:23:54 mail1 sshd\[22508\]: Failed password for invalid user ts3server from 104.254.244.205 port 43162 ssh2
Sep  8 10:28:32 mail1 sshd\[24832\]: Invalid user git from 104.254.244.205 port 36856
Sep  8 10:28:32 mail1 sshd\[24832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.254.244.205
...
2019-09-08 23:12:05
212.92.122.46 attack
scan z
2019-09-08 23:13:24
121.167.213.172 attack
Sep  8 12:10:45 MK-Soft-VM4 sshd\[12119\]: Invalid user pi from 121.167.213.172 port 44086
Sep  8 12:10:45 MK-Soft-VM4 sshd\[12121\]: Invalid user pi from 121.167.213.172 port 44096
Sep  8 12:10:45 MK-Soft-VM4 sshd\[12119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.167.213.172
...
2019-09-08 22:30:55
222.255.146.19 attackspambots
Sep  8 05:03:10 kapalua sshd\[9401\]: Invalid user sinusbot from 222.255.146.19
Sep  8 05:03:10 kapalua sshd\[9401\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.255.146.19
Sep  8 05:03:12 kapalua sshd\[9401\]: Failed password for invalid user sinusbot from 222.255.146.19 port 43678 ssh2
Sep  8 05:08:13 kapalua sshd\[9795\]: Invalid user admin from 222.255.146.19
Sep  8 05:08:13 kapalua sshd\[9795\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.255.146.19
2019-09-08 23:21:05
201.174.182.159 attackspambots
Too many connections or unauthorized access detected from Arctic banned ip
2019-09-08 23:06:34
51.255.174.164 attack
Sep  8 05:31:44 ny01 sshd[3777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.174.164
Sep  8 05:31:45 ny01 sshd[3777]: Failed password for invalid user admin from 51.255.174.164 port 34660 ssh2
Sep  8 05:36:00 ny01 sshd[4554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.174.164
2019-09-08 23:00:36
196.200.181.2 attackspam
Sep  8 18:35:30 webhost01 sshd[10438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.200.181.2
Sep  8 18:35:32 webhost01 sshd[10438]: Failed password for invalid user admin from 196.200.181.2 port 58146 ssh2
...
2019-09-08 22:41:34
62.153.215.155 attackbotsspam
Spam Timestamp : 08-Sep-19 08:21   BlockList Provider  combined abuse   (727)
2019-09-08 22:40:11
155.143.86.10 attackbotsspam
Spam Timestamp : 08-Sep-19 08:21   BlockList Provider  combined abuse   (728)
2019-09-08 22:38:47

Recently Reported IPs

38.101.151.100 63.134.75.123 77.246.105.46 118.201.98.241
241.8.222.63 128.199.193.132 219.196.34.83 225.84.11.44
37.160.182.34 200.45.105.59 186.2.146.93 113.176.138.127
79.158.53.53 64.64.204.204 219.59.29.82 108.178.111.179
44.135.209.118 195.249.80.195 85.145.124.113 93.186.254.17