Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Pittsburgh

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.142.147.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49552
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.142.147.123.		IN	A

;; AUTHORITY SECTION:
.			536	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010301 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 04 10:12:04 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 123.147.142.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 123.147.142.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.199.88.188 attackbotsspam
Automatic report - Banned IP Access
2019-10-27 00:59:21
106.75.141.202 attackbotsspam
2019-10-26T17:57:12.784476scmdmz1 sshd\[21011\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.202  user=root
2019-10-26T17:57:14.757072scmdmz1 sshd\[21011\]: Failed password for root from 106.75.141.202 port 59355 ssh2
2019-10-26T18:03:27.620310scmdmz1 sshd\[21765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.75.141.202  user=root
...
2019-10-27 00:38:12
52.172.138.31 attackbotsspam
Invalid user andres from 52.172.138.31 port 47342
2019-10-27 01:04:32
148.70.23.131 attack
Oct 26 21:22:34 webhost01 sshd[1541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.23.131
Oct 26 21:22:36 webhost01 sshd[1541]: Failed password for invalid user Passwort12 from 148.70.23.131 port 43281 ssh2
...
2019-10-27 01:07:57
178.128.112.98 attack
2019-10-26T16:16:12.334540abusebot-5.cloudsearch.cf sshd\[20439\]: Invalid user bjorn from 178.128.112.98 port 38261
2019-10-27 00:48:37
118.25.143.199 attack
Oct 26 18:02:17 xeon sshd[31394]: Failed password for root from 118.25.143.199 port 55740 ssh2
2019-10-27 00:59:03
207.148.102.16 attackspambots
[portscan] Port scan
2019-10-27 01:00:21
45.167.250.19 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.167.250.19  user=root
Failed password for root from 45.167.250.19 port 47404 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.167.250.19  user=root
Failed password for root from 45.167.250.19 port 37040 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.167.250.19  user=root
2019-10-27 00:51:18
114.237.188.98 attackspambots
SpamReport
2019-10-27 00:37:46
164.132.102.168 attackspambots
Automatic report - Banned IP Access
2019-10-27 01:06:38
156.198.254.109 attack
Invalid user admin from 156.198.254.109 port 56786
2019-10-27 01:13:47
103.52.52.23 attack
Oct 26 13:02:08 XXX sshd[28411]: Invalid user abt from 103.52.52.23 port 34258
2019-10-27 00:50:20
101.99.13.84 attackbots
Unauthorised access (Oct 26) SRC=101.99.13.84 LEN=52 TTL=112 ID=1823 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-27 00:58:37
159.224.194.240 attack
...
2019-10-27 01:13:07
106.12.126.42 attackspam
Invalid user dsetiadi from 106.12.126.42 port 36436
2019-10-27 01:16:48

Recently Reported IPs

197.156.158.9 64.72.237.175 94.39.3.168 2804:431:c7ce:f603:3024:8802:5ce8:ea0b
207.136.32.216 73.102.41.40 94.68.33.16 10.42.43.24
246.124.196.12 80.212.210.97 252.156.142.74 9.91.28.56
56.219.51.69 30.82.240.68 193.196.101.29 26.197.67.208
63.44.158.185 155.223.73.17 140.87.28.186 13.35.166.104