Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.116.129.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48637
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.116.129.145.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 10:41:20 CST 2025
;; MSG SIZE  rcvd: 108
Host info
145.129.116.142.in-addr.arpa domain name pointer lnsm4-toronto63-142-116-129-145.internet.virginmobile.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.129.116.142.in-addr.arpa	name = lnsm4-toronto63-142-116-129-145.internet.virginmobile.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.91.210.35 attack
Unauthorized connection attempt from IP address 113.91.210.35 on Port 445(SMB)
2020-01-15 06:43:51
94.23.50.194 attackspam
leo_www
2020-01-15 06:41:28
187.149.73.255 attack
Unauthorized connection attempt from IP address 187.149.73.255 on Port 445(SMB)
2020-01-15 06:53:07
112.85.42.176 attackbots
$f2bV_matches
2020-01-15 06:43:07
222.186.180.142 attackbots
Jan 14 23:39:35 MK-Soft-Root1 sshd[538]: Failed password for root from 222.186.180.142 port 14373 ssh2
Jan 14 23:39:39 MK-Soft-Root1 sshd[538]: Failed password for root from 222.186.180.142 port 14373 ssh2
...
2020-01-15 06:44:25
114.112.58.134 attackspam
Unauthorized connection attempt detected from IP address 114.112.58.134 to port 2220 [J]
2020-01-15 06:47:14
95.10.15.159 attackspambots
Unauthorized connection attempt from IP address 95.10.15.159 on Port 445(SMB)
2020-01-15 06:57:26
91.134.141.89 attackbotsspam
Jan 14 23:54:48 mout sshd[4515]: Invalid user redis from 91.134.141.89 port 38922
2020-01-15 07:04:39
211.103.193.66 attack
Jan 14 13:51:47 : SSH login attempts with invalid user
2020-01-15 07:13:46
190.75.144.91 attackbotsspam
invalid login attempt
2020-01-15 07:08:05
124.123.101.131 attackspam
Unauthorized connection attempt from IP address 124.123.101.131 on Port 445(SMB)
2020-01-15 06:40:15
222.186.180.130 attackspambots
Jan 14 23:30:11 vmanager6029 sshd\[21489\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
Jan 14 23:30:13 vmanager6029 sshd\[21489\]: Failed password for root from 222.186.180.130 port 50564 ssh2
Jan 14 23:30:16 vmanager6029 sshd\[21489\]: Failed password for root from 222.186.180.130 port 50564 ssh2
2020-01-15 06:47:44
189.170.62.177 attackspambots
Unauthorized connection attempt from IP address 189.170.62.177 on Port 445(SMB)
2020-01-15 07:04:20
160.153.153.29 attack
Automatic report - XMLRPC Attack
2020-01-15 07:09:23
122.176.39.204 attackbots
SSH Brute-Force reported by Fail2Ban
2020-01-15 06:59:37

Recently Reported IPs

67.81.19.247 63.194.34.156 227.44.245.120 116.28.78.4
119.109.229.119 219.29.8.122 93.81.27.247 57.48.75.149
113.97.200.176 48.141.166.155 96.5.91.125 228.12.84.57
159.169.4.46 205.127.87.171 203.24.200.1 196.174.224.34
192.32.50.152 8.116.236.249 126.68.43.11 137.49.54.7