Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Falkenstein

Region: Sachsen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
136.243.102.233 attackspam
WordPress brute force
2020-06-19 07:12:40
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.243.102.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5396
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.243.102.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 09:54:30 CST 2025
;; MSG SIZE  rcvd: 108
Host info
142.102.243.136.in-addr.arpa domain name pointer static.142.102.243.136.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.102.243.136.in-addr.arpa	name = static.142.102.243.136.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.234.6.105 attack
5x Failed Password
2020-03-18 05:50:46
52.67.115.83 attack
52.67.115.83 - - [17/Mar/2020:22:16:15 +0100] "GET /wp-login.php HTTP/1.1" 200 6463 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.67.115.83 - - [17/Mar/2020:22:16:18 +0100] "POST /wp-login.php HTTP/1.1" 200 7362 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
52.67.115.83 - - [17/Mar/2020:22:16:27 +0100] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-18 05:43:29
187.59.42.223 attackspambots
$f2bV_matches
2020-03-18 06:04:42
36.35.164.12 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 06:15:39
222.186.175.154 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-18 06:14:22
64.227.69.57 attackbotsspam
Hits on port : 1089
2020-03-18 06:06:03
188.212.100.88 attack
8443/tcp
[2020-03-17]1pkt
2020-03-18 06:02:55
49.235.191.199 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 05:40:58
103.102.64.250 attackspam
20/3/17@16:14:12: FAIL: Alarm-Network address from=103.102.64.250
20/3/17@16:14:12: FAIL: Alarm-Network address from=103.102.64.250
...
2020-03-18 06:01:56
39.106.30.71 attack
Website administration hacking try
2020-03-18 05:41:55
177.55.157.219 attackspambots
Automatic report - Port Scan Attack
2020-03-18 06:06:21
110.77.138.230 attack
Automatic report - Port Scan Attack
2020-03-18 06:03:30
88.132.237.187 attack
Mar 17 17:59:14 firewall sshd[15268]: Invalid user jhpark from 88.132.237.187
Mar 17 17:59:17 firewall sshd[15268]: Failed password for invalid user jhpark from 88.132.237.187 port 41363 ssh2
Mar 17 18:03:22 firewall sshd[15512]: Invalid user user9 from 88.132.237.187
...
2020-03-18 06:13:49
34.74.241.201 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-18 06:06:57
36.91.145.119 attack
Port probing on unauthorized port 23
2020-03-18 06:18:17

Recently Reported IPs

82.110.250.129 165.218.96.55 236.131.178.18 213.253.149.149
117.122.135.16 49.215.198.203 175.19.70.122 51.63.234.134
52.5.214.139 185.47.53.253 122.9.179.221 15.41.89.197
121.13.199.52 106.199.207.31 172.229.65.39 130.128.222.188
139.57.83.55 73.86.156.152 22.113.207.64 255.104.145.108