Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.114.52.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10075
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.114.52.135.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 15:28:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
135.52.114.142.in-addr.arpa domain name pointer bras-base-ngflon0514w-grc-35-142-114-52-135.dsl.bell.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
135.52.114.142.in-addr.arpa	name = bras-base-ngflon0514w-grc-35-142-114-52-135.dsl.bell.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
184.105.247.194 attack
Unauthorized connection attempt detected from IP address 184.105.247.194 to port 5900
2020-06-24 01:45:47
194.1.232.158 attack
Unauthorized connection attempt detected from IP address 194.1.232.158 to port 445 [T]
2020-06-24 01:42:38
138.219.197.248 attack
Scanned 317 unique addresses for 2 unique TCP ports in 24 hours (ports 5234,12097)
2020-06-24 01:50:02
196.52.43.120 attackspam
 TCP (SYN) 196.52.43.120:50633 -> port 135, len 44
2020-06-24 01:41:29
87.251.74.48 attack
Jun 23 10:14:56 propaganda sshd[10257]: Connection from 87.251.74.48 port 9194 on 10.0.0.160 port 22 rdomain ""
Jun 23 10:14:56 propaganda sshd[10257]: error: kex_exchange_identification: Connection closed by remote host
2020-06-24 01:35:22
120.28.122.103 attack
Unauthorized connection attempt detected from IP address 120.28.122.103 to port 23 [T]
2020-06-24 01:31:15
165.227.114.134 attack
" "
2020-06-24 01:27:40
95.188.95.214 attackspam
Unauthorized connection attempt detected from IP address 95.188.95.214 to port 445 [T]
2020-06-24 01:52:30
89.248.167.131 attackbotsspam
 TCP (SYN) 89.248.167.131:30802 -> port 1962, len 44
2020-06-24 01:53:33
14.166.109.156 attackspam
Unauthorized connection attempt detected from IP address 14.166.109.156 to port 445 [T]
2020-06-24 01:39:06
128.14.133.58 attack
Unauthorized connection attempt detected from IP address 128.14.133.58 to port 443
2020-06-24 01:29:37
176.100.110.198 attackbots
Unauthorized connection attempt detected from IP address 176.100.110.198 to port 445 [T]
2020-06-24 01:26:58
46.46.45.6 attack
Unauthorized connection attempt detected from IP address 46.46.45.6 to port 445 [T]
2020-06-24 01:15:47
161.35.230.183 attackbots
Automatic report - Port Scan
2020-06-24 01:48:03
156.234.162.133 attackspambots
$f2bV_matches
2020-06-24 01:48:29

Recently Reported IPs

16.121.207.182 154.87.165.137 227.41.227.156 9.145.86.65
103.161.29.160 154.145.218.39 60.54.103.144 84.59.153.68
101.80.168.23 212.180.57.145 144.59.43.109 29.168.128.35
251.16.3.44 38.205.199.254 224.39.69.66 127.180.223.63
18.5.157.185 162.1.30.147 161.248.147.83 152.8.234.221