Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: China Unicom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 122.143.66.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;122.143.66.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062901 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 10:48:06 CST 2025
;; MSG SIZE  rcvd: 107
Host info
142.66.143.122.in-addr.arpa domain name pointer 142.66.143.122.adsl-pool.jlccptt.net.cn.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.66.143.122.in-addr.arpa	name = 142.66.143.122.adsl-pool.jlccptt.net.cn.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.28.64.128 attackbotsspam
2020-03-10T15:34:24.732034linuxbox-skyline sshd[7843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.64.128  user=root
2020-03-10T15:34:27.141619linuxbox-skyline sshd[7843]: Failed password for root from 129.28.64.128 port 33224 ssh2
...
2020-03-11 09:05:18
216.209.43.253 attackbotsspam
SSH brute force
2020-03-11 08:59:25
62.234.74.29 attackbots
SSH Invalid Login
2020-03-11 09:06:58
145.239.91.149 attack
Ssh brute force
2020-03-11 08:56:13
163.172.176.138 attack
k+ssh-bruteforce
2020-03-11 08:48:10
87.98.182.87 attackspambots
suspicious action Tue, 10 Mar 2020 15:10:29 -0300
2020-03-11 08:32:29
117.157.80.47 attackbotsspam
Invalid user ubuntu from 117.157.80.47 port 53401
2020-03-11 08:29:39
117.69.47.80 attackbots
suspicious action Tue, 10 Mar 2020 15:09:51 -0300
2020-03-11 09:00:31
195.154.83.65 attack
Automatic report - XMLRPC Attack
2020-03-11 08:51:36
145.239.91.88 attackspam
5x Failed Password
2020-03-11 09:04:54
46.174.66.197 attackspam
Registration spam
2020-03-11 08:47:16
198.108.66.230 attackbotsspam
Multiport scan : 4 ports scanned 9140 9194 9870 10034
2020-03-11 08:42:18
106.75.118.145 attackbotsspam
port
2020-03-11 08:58:01
122.241.205.170 attackspambots
suspicious action Tue, 10 Mar 2020 15:09:58 -0300
2020-03-11 08:56:48
149.28.136.62 attack
149.28.136.62 - - [10/Mar/2020:22:37:10 +0100] "GET /wp-login.php HTTP/1.1" 200 5466 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.28.136.62 - - [10/Mar/2020:22:37:11 +0100] "POST /wp-login.php HTTP/1.1" 200 6246 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
149.28.136.62 - - [10/Mar/2020:22:37:13 +0100] "POST /xmlrpc.php HTTP/1.1" 200 437 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-11 09:04:28

Recently Reported IPs

71.33.38.169 1.70.189.231 163.98.229.242 38.63.241.21
74.24.17.85 52.165.88.92 107.108.221.114 222.181.238.136
217.250.57.255 100.172.218.207 174.193.226.118 39.201.59.185
174.233.241.121 49.31.155.26 40.56.105.41 25.32.24.204
120.118.119.155 140.195.183.202 172.36.165.190 13.172.210.33