Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Plattsburgh

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       137.142.0.0 - 137.142.255.255
CIDR:           137.142.0.0/16
NetName:        SUC-PLATT
NetHandle:      NET-137-142-0-0-1
Parent:         NET137 (NET-137-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   SUNY College at Plattsburgh (SCAP-2-Z)
RegDate:        1989-11-29
Updated:        2023-06-01
Ref:            https://rdap.arin.net/registry/ip/137.142.0.0


OrgName:        SUNY College at Plattsburgh
OrgId:          SCAP-2-Z
Address:        101 Broad Street
City:           Plattsburgh
StateProv:      NY
PostalCode:     12901
Country:        US
RegDate:        2023-04-19
Updated:        2024-12-06
Ref:            https://rdap.arin.net/registry/entity/SCAP-2-Z


OrgTechHandle: WHITN64-ARIN
OrgTechName:   Whitney, Tyler 
OrgTechPhone:  +1-518-564-2443 
OrgTechEmail:  whit4763@plattsburgh.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/WHITN64-ARIN

OrgTechHandle: ROSEN424-ARIN
OrgTechName:   Rosenbrock, Justin 
OrgTechPhone:  +1-518-564-5331 
OrgTechEmail:  jrose003@plattsburgh.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/ROSEN424-ARIN

OrgAbuseHandle: AGUGL-ARIN
OrgAbuseName:   Aguglia, Shawn 
OrgAbusePhone:  +1-518-564-5328 
OrgAbuseEmail:  aguglisp@plattsburgh.edu
OrgAbuseRef:    https://rdap.arin.net/registry/entity/AGUGL-ARIN

OrgDNSHandle: WHITN64-ARIN
OrgDNSName:   Whitney, Tyler 
OrgDNSPhone:  +1-518-564-2443 
OrgDNSEmail:  whit4763@plattsburgh.edu
OrgDNSRef:    https://rdap.arin.net/registry/entity/WHITN64-ARIN

OrgNOCHandle: ROSEN424-ARIN
OrgNOCName:   Rosenbrock, Justin 
OrgNOCPhone:  +1-518-564-5331 
OrgNOCEmail:  jrose003@plattsburgh.edu
OrgNOCRef:    https://rdap.arin.net/registry/entity/ROSEN424-ARIN

OrgTechHandle: MYERS629-ARIN
OrgTechName:   Myers, TJ 
OrgTechPhone:  +1-518-564-2449 
OrgTechEmail:  myersjtj@plattsburgh.edu
OrgTechRef:    https://rdap.arin.net/registry/entity/MYERS629-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 137.142.187.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5417
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;137.142.187.141.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032101 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 22 04:19:34 CST 2026
;; MSG SIZE  rcvd: 108
Host info
Host 141.187.142.137.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.187.142.137.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.221.237 attackspam
(sshd) Failed SSH login from 178.128.221.237 (-): 5 in the last 3600 secs
2019-07-07 10:50:54
218.155.31.247 attackbots
2019-07-07T02:34:55.9120461240 sshd\[4351\]: Invalid user bamboo from 218.155.31.247 port 51628
2019-07-07T02:34:55.9176341240 sshd\[4351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.155.31.247
2019-07-07T02:34:58.5306841240 sshd\[4351\]: Failed password for invalid user bamboo from 218.155.31.247 port 51628 ssh2
...
2019-07-07 11:00:02
39.97.49.62 attackspam
techno.ws 39.97.49.62 \[07/Jul/2019:01:10:32 +0200\] "POST /wp-login.php HTTP/1.1" 200 5605 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
techno.ws 39.97.49.62 \[07/Jul/2019:01:10:34 +0200\] "POST /xmlrpc.php HTTP/1.1" 200 4071 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2019-07-07 10:14:31
200.71.222.24 attackspambots
firewall-block, port(s): 445/tcp
2019-07-07 10:28:46
192.241.204.70 attackspambots
110/tcp 2086/tcp 53790/tcp...
[2019-05-10/07-06]60pkt,46pt.(tcp),2pt.(udp)
2019-07-07 10:12:55
13.235.109.236 attackbots
13.235.109.236 - - [07/Jul/2019:01:09:27 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
13.235.109.236 - - [07/Jul/2019:01:09:39 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
13.235.109.236 - - [07/Jul/2019:01:09:46 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
13.235.109.236 - - [07/Jul/2019:01:09:58 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
13.235.109.236 - - [07/Jul/2019:01:10:07 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
13.235.109.236 - - [07/Jul/2019:01:10:20 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-07 10:25:35
114.40.166.122 attackbotsspam
Honeypot attack, port: 23, PTR: 114-40-166-122.dynamic-ip.hinet.net.
2019-07-07 10:42:21
58.46.64.38 attackspam
Autoban   58.46.64.38 ABORTED AUTH
2019-07-07 10:27:14
222.170.168.82 attack
Brute force attempt
2019-07-07 10:53:16
183.105.217.170 attackspam
Jul  7 04:12:12 dedicated sshd[3036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.105.217.170
Jul  7 04:12:12 dedicated sshd[3036]: Invalid user anonymous from 183.105.217.170 port 35240
Jul  7 04:12:14 dedicated sshd[3036]: Failed password for invalid user anonymous from 183.105.217.170 port 35240 ssh2
Jul  7 04:15:01 dedicated sshd[3282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.105.217.170  user=root
Jul  7 04:15:04 dedicated sshd[3282]: Failed password for root from 183.105.217.170 port 47915 ssh2
2019-07-07 10:15:35
124.41.211.27 attack
Jul  7 04:24:53 ns37 sshd[2822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.41.211.27
Jul  7 04:24:53 ns37 sshd[2822]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.41.211.27
2019-07-07 10:31:17
49.150.103.92 attack
Jul  6 19:10:25 localhost kernel: [13698818.402687] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=49.150.103.92 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=26209 DF PROTO=TCP SPT=11577 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul  6 19:10:25 localhost kernel: [13698818.402718] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:a8:41:08:00 SRC=49.150.103.92 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=26209 DF PROTO=TCP SPT=11577 DPT=8291 SEQ=1983425347 ACK=0 WINDOW=8192 RES=0x00 SYN URGP=0 OPT (0204058C0103030201010402) 
Jul  6 19:10:29 localhost kernel: [13698822.441968] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=49.150.103.92 DST=[mungedIP2] LEN=52 TOS=0x00 PREC=0x00 TTL=117 ID=19919 DF PROTO=TCP SPT=11586 DPT=8291 WINDOW=8192 RES=0x00 SYN URGP=0 
Jul  6 19:10:29 localhost kernel: [13698822.441978] iptables_INPUT_denied: IN=eth0 OUT= MAC=f2:3c:91:84:83:95:84:78:ac:57:aa:c1:08:00 SRC=49.150
2019-07-07 10:17:47
41.89.160.50 attackbotsspam
Jul  7 02:36:33 pornomens sshd\[21518\]: Invalid user georg from 41.89.160.50 port 34060
Jul  7 02:36:33 pornomens sshd\[21518\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.89.160.50
Jul  7 02:36:35 pornomens sshd\[21518\]: Failed password for invalid user georg from 41.89.160.50 port 34060 ssh2
...
2019-07-07 10:38:17
190.98.228.54 attackspam
$f2bV_matches
2019-07-07 10:21:33
198.143.155.138 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-07-07 10:55:40

Recently Reported IPs

140.11.28.161 138.197.172.191 134.84.30.48 146.110.207.1
109.36.174.112 10.44.3.113 10.45.29.198 10.211.20.95
10.195.245.57 10.102.4.65 10.140.99.168 10.116.163.132
10.177.22.109 3.10.242.165 54.161.61.47 44.201.208.109
32.192.202.58 100.26.29.152 2606:4700:10::6814:7110 2606:4700:10::6814:6723