Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Miyazaki

Region: Miyazaki

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 114.142.126.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8305
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;114.142.126.142.		IN	A

;; AUTHORITY SECTION:
.			508	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023043001 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon May 01 07:12:36 CST 2023
;; MSG SIZE  rcvd: 108
Host info
Host 142.126.142.114.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.126.142.114.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.90.205.29 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-20 18:19:28
45.67.15.141 attack
SSHScan
2019-11-20 18:52:50
182.240.52.164 attack
badbot
2019-11-20 18:32:06
49.88.112.115 attackbots
Nov 20 11:14:06 OPSO sshd\[11245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Nov 20 11:14:08 OPSO sshd\[11245\]: Failed password for root from 49.88.112.115 port 15823 ssh2
Nov 20 11:14:11 OPSO sshd\[11245\]: Failed password for root from 49.88.112.115 port 15823 ssh2
Nov 20 11:14:13 OPSO sshd\[11245\]: Failed password for root from 49.88.112.115 port 15823 ssh2
Nov 20 11:16:26 OPSO sshd\[11821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
2019-11-20 18:22:56
123.187.200.179 attackspam
Nov2007:24:23server2pure-ftpd:\(\?@123.187.200.179\)[WARNING]Authenticationfailedforuser[anonymous]Nov2007:24:29server2pure-ftpd:\(\?@123.187.200.179\)[WARNING]Authenticationfailedforuser[savethedogs]Nov2007:24:36server2pure-ftpd:\(\?@123.187.200.179\)[WARNING]Authenticationfailedforuser[savethedogs]Nov2007:24:41server2pure-ftpd:\(\?@123.187.200.179\)[WARNING]Authenticationfailedforuser[www]Nov2007:24:47server2pure-ftpd:\(\?@123.187.200.179\)[WARNING]Authenticationfailedforuser[www]
2019-11-20 18:50:36
148.70.222.83 attackbotsspam
Nov 20 10:36:51 localhost sshd\[115303\]: Invalid user benn from 148.70.222.83 port 39456
Nov 20 10:36:51 localhost sshd\[115303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.222.83
Nov 20 10:36:54 localhost sshd\[115303\]: Failed password for invalid user benn from 148.70.222.83 port 39456 ssh2
Nov 20 10:41:01 localhost sshd\[115470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.222.83  user=backup
Nov 20 10:41:04 localhost sshd\[115470\]: Failed password for backup from 148.70.222.83 port 47418 ssh2
...
2019-11-20 18:43:31
196.52.43.96 attackspambots
" "
2019-11-20 18:39:48
103.26.40.143 attackbotsspam
k+ssh-bruteforce
2019-11-20 18:45:53
145.239.10.217 attackbots
Nov 20 07:24:44 mail sshd[16127]: Invalid user anguelo from 145.239.10.217
Nov 20 07:24:44 mail sshd[16127]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.10.217
Nov 20 07:24:44 mail sshd[16127]: Invalid user anguelo from 145.239.10.217
Nov 20 07:24:46 mail sshd[16127]: Failed password for invalid user anguelo from 145.239.10.217 port 34438 ssh2
...
2019-11-20 18:53:40
42.113.252.25 attackspam
Port 1433 Scan
2019-11-20 18:39:25
42.242.10.6 attackbotsspam
badbot
2019-11-20 18:20:16
86.188.246.2 attackbots
Nov 20 03:34:13 ny01 sshd[27000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.188.246.2
Nov 20 03:34:15 ny01 sshd[27000]: Failed password for invalid user horror from 86.188.246.2 port 57629 ssh2
Nov 20 03:37:55 ny01 sshd[27342]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=86.188.246.2
2019-11-20 18:55:06
106.46.161.196 attack
badbot
2019-11-20 18:38:54
176.106.178.197 attackspambots
Nov 20 08:41:00 pkdns2 sshd\[6139\]: Invalid user psswd from 176.106.178.197Nov 20 08:41:02 pkdns2 sshd\[6139\]: Failed password for invalid user psswd from 176.106.178.197 port 43310 ssh2Nov 20 08:44:56 pkdns2 sshd\[6267\]: Invalid user gavriella from 176.106.178.197Nov 20 08:44:58 pkdns2 sshd\[6267\]: Failed password for invalid user gavriella from 176.106.178.197 port 33657 ssh2Nov 20 08:48:54 pkdns2 sshd\[6447\]: Invalid user appuser from 176.106.178.197Nov 20 08:48:56 pkdns2 sshd\[6447\]: Failed password for invalid user appuser from 176.106.178.197 port 52229 ssh2
...
2019-11-20 18:31:24
27.209.166.202 attackbots
badbot
2019-11-20 18:31:49

Recently Reported IPs

171.97.100.128 31.3.29.18 177.66.248.112 169.101.194.189
69.58.115.80 26.97.186.2 175.248.189.110 117.128.87.25
155.212.222.95 107.178.49.79 193.35.18.65 79.161.228.23
43.153.19.69 58.137.80.219 63.107.35.148 39.191.56.70
118.82.164.201 80.232.54.231 128.101.24.249 190.105.93.53