Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 134.44.74.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43848
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;134.44.74.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 11:03:54 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 142.74.44.134.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.74.44.134.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.25.177 attackspambots
Aug 12 02:30:08 thevastnessof sshd[21411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.25.177
...
2019-08-12 18:50:36
180.246.158.6 attack
Aug 12 10:02:10 MK-Soft-VM6 sshd\[22074\]: Invalid user eddie from 180.246.158.6 port 59632
Aug 12 10:02:10 MK-Soft-VM6 sshd\[22074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.246.158.6
Aug 12 10:02:12 MK-Soft-VM6 sshd\[22074\]: Failed password for invalid user eddie from 180.246.158.6 port 59632 ssh2
...
2019-08-12 18:09:17
192.42.116.25 attack
Automatic report - Banned IP Access
2019-08-12 18:55:04
194.247.21.243 attackbots
Unauthorized connection attempt from IP address 194.247.21.243 on Port 445(SMB)
2019-08-12 18:50:20
222.165.196.2 attackspambots
Unauthorized connection attempt from IP address 222.165.196.2 on Port 445(SMB)
2019-08-12 18:27:54
209.141.34.95 attackspambots
Aug 12 11:07:47 [munged] sshd[3294]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.34.95  user=root
Aug 12 11:07:49 [munged] sshd[3294]: Failed password for root from 209.141.34.95 port 44706 ssh2
2019-08-12 18:58:16
190.96.232.145 attack
firewall-block, port(s): 23/tcp
2019-08-12 18:41:33
103.78.96.131 attackspambots
Unauthorized connection attempt from IP address 103.78.96.131 on Port 445(SMB)
2019-08-12 18:30:02
77.40.61.229 attackspambots
$f2bV_matches
2019-08-12 18:20:50
186.42.182.41 attackspambots
firewall-block, port(s): 445/tcp
2019-08-12 18:42:59
142.93.15.1 attack
$f2bV_matches
2019-08-12 18:49:49
193.144.61.81 attackspambots
DATE:2019-08-12 12:41:58,IP:193.144.61.81,MATCHES:10,PORT:ssh
2019-08-12 18:45:25
202.51.74.189 attack
Aug 12 07:52:18 h2177944 sshd\[7055\]: Invalid user lian from 202.51.74.189 port 48022
Aug 12 07:52:18 h2177944 sshd\[7055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.74.189
Aug 12 07:52:21 h2177944 sshd\[7055\]: Failed password for invalid user lian from 202.51.74.189 port 48022 ssh2
Aug 12 07:57:42 h2177944 sshd\[7212\]: Invalid user polycom from 202.51.74.189 port 41040
...
2019-08-12 18:19:06
117.3.63.77 attackbotsspam
Unauthorized connection attempt from IP address 117.3.63.77 on Port 445(SMB)
2019-08-12 18:08:46
176.113.70.130 attackbots
firewall-block, port(s): 445/tcp
2019-08-12 18:45:42

Recently Reported IPs

67.23.152.128 251.240.229.38 8.87.234.175 155.147.6.239
169.133.116.119 25.31.34.236 141.124.69.109 53.231.90.201
45.236.216.203 76.222.229.125 121.200.149.199 137.231.38.161
33.38.153.211 229.190.144.114 123.119.215.219 125.211.125.196
87.196.57.41 73.27.3.111 69.110.167.146 28.60.241.74