Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Alcatel-Lucent

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 135.241.169.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53343
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;135.241.169.142.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072001 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 21 02:17:10 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 142.169.241.135.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 142.169.241.135.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.52.180.196 attackspam
2019-09-08T00:00:07.805509abusebot-6.cloudsearch.cf sshd\[29956\]: Invalid user developer from 106.52.180.196 port 56870
2019-09-08T00:00:07.811490abusebot-6.cloudsearch.cf sshd\[29956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.180.196
2019-09-08 09:29:01
150.242.199.13 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 20:29:21,950 INFO [amun_request_handler] PortScan Detected on Port: 445 (150.242.199.13)
2019-09-08 09:24:59
45.125.65.58 attackspambots
2019-09-07T23:02:18.275166ns1.unifynetsol.net postfix/smtpd\[12586\]: warning: unknown\[45.125.65.58\]: SASL LOGIN authentication failed: authentication failure
2019-09-08T00:06:50.389202ns1.unifynetsol.net postfix/smtpd\[22928\]: warning: unknown\[45.125.65.58\]: SASL LOGIN authentication failed: authentication failure
2019-09-08T01:11:05.324052ns1.unifynetsol.net postfix/smtpd\[32640\]: warning: unknown\[45.125.65.58\]: SASL LOGIN authentication failed: authentication failure
2019-09-08T02:15:06.273066ns1.unifynetsol.net postfix/smtpd\[12366\]: warning: unknown\[45.125.65.58\]: SASL LOGIN authentication failed: authentication failure
2019-09-08T03:19:04.640335ns1.unifynetsol.net postfix/smtpd\[21062\]: warning: unknown\[45.125.65.58\]: SASL LOGIN authentication failed: authentication failure
2019-09-08 09:37:33
167.71.41.110 attackspam
Automatic report - Banned IP Access
2019-09-08 09:57:09
173.164.173.36 attackspambots
Sep  7 15:41:00 tdfoods sshd\[9098\]: Invalid user p@ssw0rd from 173.164.173.36
Sep  7 15:41:00 tdfoods sshd\[9098\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173-164-173-36-sfba.hfc.comcastbusiness.net
Sep  7 15:41:01 tdfoods sshd\[9098\]: Failed password for invalid user p@ssw0rd from 173.164.173.36 port 44238 ssh2
Sep  7 15:45:20 tdfoods sshd\[9509\]: Invalid user isabell from 173.164.173.36
Sep  7 15:45:20 tdfoods sshd\[9509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173-164-173-36-sfba.hfc.comcastbusiness.net
2019-09-08 09:55:07
180.232.83.238 attack
$f2bV_matches
2019-09-08 09:21:13
90.187.62.121 attackspambots
Sep  8 05:41:41 areeb-Workstation sshd[16763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.187.62.121
Sep  8 05:41:43 areeb-Workstation sshd[16763]: Failed password for invalid user ts3 from 90.187.62.121 port 55538 ssh2
...
2019-09-08 09:57:34
111.231.85.239 attackbotsspam
Sep  7 20:40:50 web1 postfix/smtpd[539]: warning: unknown[111.231.85.239]: SASL LOGIN authentication failed: authentication failure
...
2019-09-08 09:41:22
134.175.153.238 attackbotsspam
Sep  7 13:46:54 sachi sshd\[6393\]: Invalid user vbox from 134.175.153.238
Sep  7 13:46:54 sachi sshd\[6393\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.153.238
Sep  7 13:46:56 sachi sshd\[6393\]: Failed password for invalid user vbox from 134.175.153.238 port 58606 ssh2
Sep  7 13:51:24 sachi sshd\[6790\]: Invalid user miusuario from 134.175.153.238
Sep  7 13:51:24 sachi sshd\[6790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.153.238
2019-09-08 10:01:00
59.126.149.196 attackbots
Sep  8 01:50:54 MainVPS sshd[7488]: Invalid user testuser from 59.126.149.196 port 57036
Sep  8 01:50:54 MainVPS sshd[7488]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.126.149.196
Sep  8 01:50:54 MainVPS sshd[7488]: Invalid user testuser from 59.126.149.196 port 57036
Sep  8 01:50:56 MainVPS sshd[7488]: Failed password for invalid user testuser from 59.126.149.196 port 57036 ssh2
Sep  8 01:55:46 MainVPS sshd[7947]: Invalid user deployer from 59.126.149.196 port 45388
...
2019-09-08 09:25:43
179.98.4.193 attackspambots
Sep  8 03:32:57 markkoudstaal sshd[30426]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.98.4.193
Sep  8 03:32:59 markkoudstaal sshd[30426]: Failed password for invalid user csgoserver from 179.98.4.193 port 35930 ssh2
Sep  8 03:40:55 markkoudstaal sshd[31201]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.98.4.193
2019-09-08 09:53:45
82.80.37.162 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-07 20:28:50,055 INFO [amun_request_handler] PortScan Detected on Port: 445 (82.80.37.162)
2019-09-08 09:33:25
61.137.201.41 attackspambots
Unauthorised access (Sep  8) SRC=61.137.201.41 LEN=40 TTL=49 ID=23140 TCP DPT=8080 WINDOW=21857 SYN 
Unauthorised access (Sep  7) SRC=61.137.201.41 LEN=40 TTL=49 ID=9128 TCP DPT=8080 WINDOW=6433 SYN 
Unauthorised access (Sep  7) SRC=61.137.201.41 LEN=40 TTL=49 ID=7596 TCP DPT=8080 WINDOW=27778 SYN 
Unauthorised access (Sep  7) SRC=61.137.201.41 LEN=40 TTL=49 ID=5996 TCP DPT=8080 WINDOW=46959 SYN 
Unauthorised access (Sep  7) SRC=61.137.201.41 LEN=40 TTL=49 ID=42930 TCP DPT=8080 WINDOW=1749 SYN 
Unauthorised access (Sep  6) SRC=61.137.201.41 LEN=40 TTL=49 ID=42537 TCP DPT=8080 WINDOW=46959 SYN 
Unauthorised access (Sep  5) SRC=61.137.201.41 LEN=40 TTL=49 ID=65167 TCP DPT=8080 WINDOW=21857 SYN 
Unauthorised access (Sep  5) SRC=61.137.201.41 LEN=40 TTL=49 ID=34875 TCP DPT=8080 WINDOW=1749 SYN
2019-09-08 10:06:02
177.154.139.201 attack
/login.php
2019-09-08 09:56:37
186.215.202.11 attackbotsspam
F2B jail: sshd. Time: 2019-09-08 03:30:38, Reported by: VKReport
2019-09-08 09:38:09

Recently Reported IPs

171.100.4.162 91.181.133.214 202.137.154.17 182.202.206.255
204.109.70.165 120.120.165.33 52.221.249.28 202.137.141.224
177.243.224.236 53.123.110.197 202.137.134.181 135.148.3.127
173.199.109.111 4.55.84.140 72.244.96.45 202.137.134.161
79.223.60.62 198.131.255.112 40.129.74.174 2003:d2:df43:8500:d5c3:e806:80bb:ed73