Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Naperville

Region: Illinois

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.161.142.191
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33382
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.161.142.191.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 15:37:34 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 191.142.161.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 191.142.161.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.109.52.50 attack
Oct  3 22:50:59 eventyay sshd[30575]: Failed password for root from 103.109.52.50 port 52260 ssh2
Oct  3 22:53:07 eventyay sshd[1398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.109.52.50
Oct  3 22:53:10 eventyay sshd[1398]: Failed password for invalid user P@$$w0rt!234 from 103.109.52.50 port 60102 ssh2
...
2019-10-04 05:31:39
45.118.144.31 attack
Oct  4 00:44:28 tuotantolaitos sshd[12356]: Failed password for root from 45.118.144.31 port 48498 ssh2
...
2019-10-04 05:50:51
167.114.68.123 attackspam
SSH Server BruteForce Attack
2019-10-04 06:05:35
197.85.7.159 attack
timhelmke.de 197.85.7.159 \[03/Oct/2019:22:52:45 +0200\] "POST /wp-login.php HTTP/1.1" 200 5594 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
timhelmke.de 197.85.7.159 \[03/Oct/2019:22:52:48 +0200\] "POST /wp-login.php HTTP/1.1" 200 5545 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-10-04 05:47:01
222.252.46.211 attack
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2019-10-04 06:06:33
222.186.30.152 attackbotsspam
Oct  3 23:29:06 h2177944 sshd\[25447\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.30.152  user=root
Oct  3 23:29:09 h2177944 sshd\[25447\]: Failed password for root from 222.186.30.152 port 50739 ssh2
Oct  3 23:29:10 h2177944 sshd\[25447\]: Failed password for root from 222.186.30.152 port 50739 ssh2
Oct  3 23:29:12 h2177944 sshd\[25447\]: Failed password for root from 222.186.30.152 port 50739 ssh2
...
2019-10-04 05:30:15
45.67.15.141 attackspambots
leo_www
2019-10-04 05:57:59
190.14.37.227 attackspam
Oct  3 14:42:23 localhost kernel: [3865962.740768] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=190.14.37.227 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=79 ID=50759 DF PROTO=TCP SPT=64219 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  3 14:42:23 localhost kernel: [3865962.740808] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=190.14.37.227 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=79 ID=50759 DF PROTO=TCP SPT=64219 DPT=22 SEQ=712200143 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  3 16:53:00 localhost kernel: [3873799.157992] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=190.14.37.227 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=73 ID=37888 DF PROTO=TCP SPT=65173 DPT=22 SEQ=3979357090 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0
2019-10-04 05:40:06
37.59.37.69 attackbots
2019-10-03T21:22:39.534287abusebot-4.cloudsearch.cf sshd\[25021\]: Invalid user Jelszo-123 from 37.59.37.69 port 48214
2019-10-04 05:59:34
195.20.197.222 attack
[portscan] Port scan
2019-10-04 05:34:54
121.234.96.236 attackspam
Unauthorised access (Oct  3) SRC=121.234.96.236 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=30396 TCP DPT=8080 WINDOW=53869 SYN 
Unauthorised access (Oct  3) SRC=121.234.96.236 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=57041 TCP DPT=8080 WINDOW=53869 SYN 
Unauthorised access (Oct  3) SRC=121.234.96.236 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=52128 TCP DPT=8080 WINDOW=53869 SYN 
Unauthorised access (Oct  2) SRC=121.234.96.236 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=14559 TCP DPT=8080 WINDOW=30572 SYN 
Unauthorised access (Oct  2) SRC=121.234.96.236 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=36866 TCP DPT=8080 WINDOW=30572 SYN 
Unauthorised access (Oct  2) SRC=121.234.96.236 LEN=40 TOS=0x10 PREC=0x40 TTL=49 ID=34983 TCP DPT=8080 WINDOW=38132 SYN
2019-10-04 05:52:40
51.68.178.85 attack
Oct  3 22:52:35 srv206 sshd[3562]: Invalid user admin from 51.68.178.85
...
2019-10-04 05:59:18
190.14.37.179 attack
" "
2019-10-04 05:48:46
190.14.38.215 attackspam
Oct  3 16:05:07 localhost kernel: [3870926.083380] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=190.14.38.215 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=80 ID=26465 DF PROTO=TCP SPT=53424 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  3 16:05:07 localhost kernel: [3870926.083406] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=190.14.38.215 DST=[mungedIP2] LEN=40 TOS=0x08 PREC=0x20 TTL=80 ID=26465 DF PROTO=TCP SPT=53424 DPT=22 SEQ=30574814 ACK=0 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  3 16:53:04 localhost kernel: [3873803.208568] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=190.14.38.215 DST=[mungedIP2] LEN=40 TOS=0x00 PREC=0x00 TTL=78 ID=38735 DF PROTO=TCP SPT=53720 DPT=22 WINDOW=29200 RES=0x00 SYN URGP=0 
Oct  3 16:53:04 localhost kernel: [3873803.208600] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=190.14.38.215 DST=[mungedIP2] LEN=40 TOS=0x00 PRE
2019-10-04 05:35:27
218.188.210.214 attackbots
Oct  3 23:53:37 vps01 sshd[21842]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.188.210.214
Oct  3 23:53:39 vps01 sshd[21842]: Failed password for invalid user mysql from 218.188.210.214 port 53002 ssh2
2019-10-04 05:58:19

Recently Reported IPs

18.58.146.233 255.22.155.208 203.68.28.233 228.216.176.38
88.67.246.68 34.7.108.104 218.142.242.145 165.153.131.135
150.155.57.195 93.211.12.154 130.196.83.142 45.2.223.161
145.249.22.243 160.210.3.226 133.233.222.161 7.103.50.253
147.26.99.20 89.150.84.211 220.203.208.152 97.97.224.117