Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.161.5.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46114
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.161.5.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 03:47:09 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 142.5.161.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.5.161.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.158.164.146 attack
Aug 16 21:32:49 jumpserver sshd[175916]: Invalid user clj from 124.158.164.146 port 33370
Aug 16 21:32:51 jumpserver sshd[175916]: Failed password for invalid user clj from 124.158.164.146 port 33370 ssh2
Aug 16 21:37:02 jumpserver sshd[175947]: Invalid user info from 124.158.164.146 port 58466
...
2020-08-17 05:47:48
58.96.237.121 attackspambots
2020-08-16 15:18:32.399905-0500  localhost smtpd[95147]: NOQUEUE: reject: RCPT from unknown[58.96.237.121]: 554 5.7.1 Service unavailable; Client host [58.96.237.121] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/58.96.237.121 / https://www.spamhaus.org/sbl/query/SBLCSS; from= to= proto=ESMTP helo=<[58.96.237.121]>
2020-08-17 05:53:07
49.88.112.112 attack
Aug 16 17:35:01 plusreed sshd[18477]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112  user=root
Aug 16 17:35:03 plusreed sshd[18477]: Failed password for root from 49.88.112.112 port 50670 ssh2
...
2020-08-17 05:35:40
49.235.135.230 attackbotsspam
Aug 16 21:46:10 rocket sshd[3100]: Failed password for root from 49.235.135.230 port 49776 ssh2
Aug 16 21:49:11 rocket sshd[3470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.135.230
...
2020-08-17 05:35:56
103.145.12.217 attackspambots
[2020-08-16 17:29:09] NOTICE[1185] chan_sip.c: Registration from '"806" ' failed for '103.145.12.217:5312' - Wrong password
[2020-08-16 17:29:09] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-16T17:29:09.574-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="806",SessionID="0x7f10c4245bd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.145.12.217/5312",Challenge="79e378cd",ReceivedChallenge="79e378cd",ReceivedHash="42451f6a6ffb7896afe240c5427206cf"
[2020-08-16 17:29:09] NOTICE[1185] chan_sip.c: Registration from '"806" ' failed for '103.145.12.217:5312' - Wrong password
[2020-08-16 17:29:09] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-08-16T17:29:09.672-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="806",SessionID="0x7f10c4481d18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/103.1
...
2020-08-17 05:44:59
173.15.85.9 attackspam
Aug 16 23:43:46 electroncash sshd[5072]: Invalid user firefart from 173.15.85.9 port 63859
Aug 16 23:43:46 electroncash sshd[5072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.15.85.9 
Aug 16 23:43:46 electroncash sshd[5072]: Invalid user firefart from 173.15.85.9 port 63859
Aug 16 23:43:49 electroncash sshd[5072]: Failed password for invalid user firefart from 173.15.85.9 port 63859 ssh2
Aug 16 23:48:40 electroncash sshd[6372]: Invalid user Nicole from 173.15.85.9 port 25005
...
2020-08-17 05:54:55
78.128.113.116 attackspambots
2020-08-16 23:05:41 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data \(set_id=admin12@no-server.de\)
2020-08-16 23:05:48 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data
2020-08-16 23:05:57 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data
2020-08-16 23:06:02 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data
2020-08-16 23:06:14 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data
2020-08-16 23:06:19 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Incorrect authentication data
2020-08-16 23:06:24 dovecot_login authenticator failed for \(ip-113-116.4vendeta.com.\) \[78.128.113.116\]: 535 Inco
...
2020-08-17 05:17:09
2a01:4f8:190:4324::2 attackspambots
20 attempts against mh-misbehave-ban on cedar
2020-08-17 05:25:10
213.92.227.89 attackbotsspam
Tried our host z.
2020-08-17 05:20:15
222.186.30.218 attackspambots
Aug 16 21:53:53 rush sshd[10950]: Failed password for root from 222.186.30.218 port 47417 ssh2
Aug 16 21:54:00 rush sshd[10953]: Failed password for root from 222.186.30.218 port 43687 ssh2
...
2020-08-17 05:54:17
106.13.235.228 attack
Aug 16 22:27:28 ns382633 sshd\[12866\]: Invalid user k from 106.13.235.228 port 41532
Aug 16 22:27:28 ns382633 sshd\[12866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.235.228
Aug 16 22:27:30 ns382633 sshd\[12866\]: Failed password for invalid user k from 106.13.235.228 port 41532 ssh2
Aug 16 22:33:30 ns382633 sshd\[13793\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.235.228  user=root
Aug 16 22:33:32 ns382633 sshd\[13793\]: Failed password for root from 106.13.235.228 port 59345 ssh2
2020-08-17 05:28:37
222.186.30.35 attackbots
Aug 16 21:50:00 game-panel sshd[7663]: Failed password for root from 222.186.30.35 port 37077 ssh2
Aug 16 21:50:02 game-panel sshd[7663]: Failed password for root from 222.186.30.35 port 37077 ssh2
Aug 16 21:50:04 game-panel sshd[7663]: Failed password for root from 222.186.30.35 port 37077 ssh2
2020-08-17 05:50:15
213.190.4.214 attackspambots
Aug 16 23:14:30 srv-ubuntu-dev3 sshd[25777]: Invalid user client from 213.190.4.214
Aug 16 23:14:30 srv-ubuntu-dev3 sshd[25777]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.190.4.214
Aug 16 23:14:30 srv-ubuntu-dev3 sshd[25777]: Invalid user client from 213.190.4.214
Aug 16 23:14:32 srv-ubuntu-dev3 sshd[25777]: Failed password for invalid user client from 213.190.4.214 port 60608 ssh2
Aug 16 23:18:52 srv-ubuntu-dev3 sshd[26483]: Invalid user jenny from 213.190.4.214
Aug 16 23:18:52 srv-ubuntu-dev3 sshd[26483]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.190.4.214
Aug 16 23:18:52 srv-ubuntu-dev3 sshd[26483]: Invalid user jenny from 213.190.4.214
Aug 16 23:18:54 srv-ubuntu-dev3 sshd[26483]: Failed password for invalid user jenny from 213.190.4.214 port 51296 ssh2
Aug 16 23:23:11 srv-ubuntu-dev3 sshd[27004]: Invalid user adrian from 213.190.4.214
...
2020-08-17 05:23:27
65.151.160.89 attack
Aug 16 23:31:37 PorscheCustomer sshd[5974]: Failed password for root from 65.151.160.89 port 50720 ssh2
Aug 16 23:35:25 PorscheCustomer sshd[6143]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=65.151.160.89
Aug 16 23:35:27 PorscheCustomer sshd[6143]: Failed password for invalid user darren from 65.151.160.89 port 60292 ssh2
...
2020-08-17 05:53:44
61.177.172.102 attackbotsspam
Aug 16 17:22:31 NPSTNNYC01T sshd[32000]: Failed password for root from 61.177.172.102 port 30349 ssh2
Aug 16 17:22:33 NPSTNNYC01T sshd[32000]: Failed password for root from 61.177.172.102 port 30349 ssh2
Aug 16 17:22:35 NPSTNNYC01T sshd[32000]: Failed password for root from 61.177.172.102 port 30349 ssh2
...
2020-08-17 05:35:08

Recently Reported IPs

101.130.144.82 176.75.87.150 51.33.136.118 30.49.206.165
26.189.0.202 250.235.235.152 220.141.235.198 6.70.138.77
231.234.218.20 137.153.236.139 237.28.159.62 65.248.176.11
46.63.134.197 251.205.139.177 146.28.201.168 19.15.186.212
104.0.247.29 26.57.34.15 236.92.218.94 218.11.33.25