Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.111.67.39
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24687
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.111.67.39.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025081800 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Aug 18 19:48:57 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'39.67.111.142.in-addr.arpa domain name pointer 142-111-67-39.ips.acedatacenter.com.
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
39.67.111.142.in-addr.arpa	name = 142-111-67-39.ips.acedatacenter.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
85.105.73.252 attackbotsspam
unauthorized connection attempt
2020-02-26 19:22:03
109.238.40.202 attackbots
unauthorized connection attempt
2020-02-26 19:19:59
183.81.106.47 attackbotsspam
Unauthorised access (Feb 26) SRC=183.81.106.47 LEN=40 TTL=44 ID=57954 TCP DPT=23 WINDOW=54235 SYN
2020-02-26 19:14:56
213.6.77.2 attack
unauthorized connection attempt
2020-02-26 19:40:21
175.151.115.12 attack
unauthorized connection attempt
2020-02-26 19:16:02
196.218.170.3 attackbotsspam
unauthorized connection attempt
2020-02-26 19:13:26
1.119.44.250 attackspambots
Feb 26 06:14:06 NPSTNNYC01T sshd[4936]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.119.44.250
Feb 26 06:14:08 NPSTNNYC01T sshd[4936]: Failed password for invalid user laojiang from 1.119.44.250 port 54516 ssh2
Feb 26 06:19:55 NPSTNNYC01T sshd[5314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.119.44.250
...
2020-02-26 19:39:35
121.136.45.212 attackspambots
unauthorized connection attempt
2020-02-26 19:18:42
41.75.3.221 attackspam
unauthorized connection attempt
2020-02-26 19:38:48
114.35.88.87 attackbots
unauthorized connection attempt
2020-02-26 19:19:13
89.185.26.11 attackbots
Unauthorized connection attempt detected from IP address 89.185.26.11 to port 5555
2020-02-26 19:52:10
124.156.54.111 attackbotsspam
unauthorized connection attempt
2020-02-26 19:17:25
211.100.96.152 attack
unauthorized connection attempt
2020-02-26 19:40:37
74.65.215.218 attack
unauthorized connection attempt
2020-02-26 19:23:34
211.100.96.170 attack
unauthorized connection attempt
2020-02-26 19:12:32

Recently Reported IPs

117.160.243.23 47.150.235.253 101.95.120.169 175.24.248.146
116.132.252.71 14.212.61.174 47.237.86.241 47.237.76.198
89.44.177.39 185.247.137.45 150.19.156.161 153.142.160.146
196.251.72.128 152.32.156.95 103.10.230.18 113.215.189.186
23.225.172.3 2a10:50c0::1312:23 2a10:50c0::aeb1:76 64.172.129.123