Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ottawa

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.113.143.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.113.143.134.		IN	A

;; AUTHORITY SECTION:
.			480	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030701 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 08 05:29:28 CST 2020
;; MSG SIZE  rcvd: 119
Host info
134.143.113.142.in-addr.arpa domain name pointer orlnon0604w-grc-08-142-113-143-134.dsl.bell.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
134.143.113.142.in-addr.arpa	name = orlnon0604w-grc-08-142-113-143-134.dsl.bell.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.247.110.238 attack
Port scan attempt detected by AWS-CCS, CTS, India
2019-07-13 11:02:52
183.90.183.152 attack
WordPress brute force
2019-07-13 10:56:05
88.201.64.185 attack
Unauthorized connection attempt from IP address 88.201.64.185 on Port 445(SMB)
2019-07-13 10:38:03
222.122.31.133 attackspam
Triggered by Fail2Ban at Vostok web server
2019-07-13 10:37:09
158.69.112.178 attackbots
158.69.112.178 - - \[13/Jul/2019:01:32:14 +0200\] "POST /wp-login.php HTTP/1.1" 200 2110 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
158.69.112.178 - - \[13/Jul/2019:01:32:15 +0200\] "POST /wp-login.php HTTP/1.1" 200 2113 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2019-07-13 11:10:51
177.67.92.81 attack
Unauthorized connection attempt from IP address 177.67.92.81 on Port 445(SMB)
2019-07-13 10:58:45
196.221.167.230 attack
Unauthorized connection attempt from IP address 196.221.167.230 on Port 445(SMB)
2019-07-13 10:43:24
14.244.233.21 attackbots
Unauthorized connection attempt from IP address 14.244.233.21 on Port 445(SMB)
2019-07-13 10:48:39
134.209.106.112 attackspambots
Jul 13 02:56:03 mail sshd\[28365\]: Invalid user jiao from 134.209.106.112 port 47614
Jul 13 02:56:03 mail sshd\[28365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.106.112
...
2019-07-13 10:56:21
13.124.41.115 attackbots
Jul 12 01:23:20 *** sshd[27643]: Failed password for invalid user yh from 13.124.41.115 port 42370 ssh2
Jul 12 01:48:34 *** sshd[28057]: Failed password for invalid user ankit from 13.124.41.115 port 35386 ssh2
Jul 12 02:09:29 *** sshd[28448]: Failed password for invalid user user from 13.124.41.115 port 53026 ssh2
Jul 12 02:20:13 *** sshd[28558]: Failed password for invalid user aj from 13.124.41.115 port 33612 ssh2
Jul 12 02:40:50 *** sshd[28917]: Failed password for invalid user testuser from 13.124.41.115 port 51194 ssh2
Jul 12 02:51:20 *** sshd[29079]: Failed password for invalid user mira from 13.124.41.115 port 60060 ssh2
Jul 12 03:22:09 *** sshd[29570]: Failed password for invalid user mm from 13.124.41.115 port 58282 ssh2
Jul 12 03:32:27 *** sshd[29708]: Failed password for invalid user ashok from 13.124.41.115 port 38870 ssh2
Jul 12 03:42:45 *** sshd[29913]: Failed password for invalid user sh from 13.124.41.115 port 47688 ssh2
Jul 12 04:14:08 *** sshd[30399]: Failed password for invalid user amber
2019-07-13 10:42:58
185.65.245.143 attackbotsspam
fail2ban honeypot
2019-07-13 10:54:00
163.179.32.49 attackspambots
WordPress brute force
2019-07-13 11:03:45
58.218.66.93 attack
Jul 13 03:30:37 debian64 sshd\[13517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.218.66.93  user=root
Jul 13 03:30:39 debian64 sshd\[13517\]: Failed password for root from 58.218.66.93 port 1407 ssh2
Jul 13 03:30:41 debian64 sshd\[13517\]: Failed password for root from 58.218.66.93 port 1407 ssh2
...
2019-07-13 10:30:53
92.53.45.120 attackbots
Spam to target mail address hacked/leaked/bought from Kachingle
2019-07-13 10:36:06
185.86.164.103 attackspam
WordPress brute force
2019-07-13 10:50:25

Recently Reported IPs

100.241.169.121 72.60.89.153 139.67.3.251 36.74.183.1
191.27.43.159 78.8.164.152 104.226.215.33 126.56.158.23
61.84.223.39 64.148.57.108 208.197.68.222 187.170.165.110
89.64.156.168 178.154.171.143 60.9.117.190 66.44.152.189
106.108.91.17 212.10.49.220 218.57.55.84 129.170.154.177