Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.116.139.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64439
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.116.139.197.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 23:37:08 CST 2025
;; MSG SIZE  rcvd: 108
Host info
197.139.116.142.in-addr.arpa domain name pointer lnsm3-torontoxn-142-116-139-197.internet.virginmobile.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
197.139.116.142.in-addr.arpa	name = lnsm3-torontoxn-142-116-139-197.internet.virginmobile.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
175.139.231.129 attackbotsspam
Jun 29 01:25:35 mail postfix/smtpd\[30117\]: warning: unknown\[175.139.231.129\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 29 01:26:05 mail postfix/smtpd\[30117\]: warning: unknown\[175.139.231.129\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 29 01:26:32 mail postfix/smtpd\[30117\]: warning: unknown\[175.139.231.129\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29 07:46:40
51.254.99.208 attackspambots
Jun 29 01:25:50 www sshd\[6904\]: Invalid user mqm from 51.254.99.208 port 50516
...
2019-06-29 08:04:27
180.250.18.71 attack
Repeated brute force against a port
2019-06-29 07:57:21
184.168.27.36 attackbotsspam
184.168.27.36 - - [28/Jun/2019:14:16:14 -0500] "GET /new/wp-includes/wlwmanifest.xml HTTP/1.1" 301 258 - "-" "-"
2019-06-29 08:06:44
222.127.30.130 attackbots
2019-06-28T23:56:41.720822abusebot-6.cloudsearch.cf sshd\[15743\]: Invalid user butter from 222.127.30.130 port 7859
2019-06-29 08:17:47
174.138.56.93 attack
28.06.2019 23:46:59 SSH access blocked by firewall
2019-06-29 08:09:33
88.214.26.47 attack
Jun 29 04:56:13 tanzim-HP-Z238-Microtower-Workstation sshd\[28057\]: Invalid user admin from 88.214.26.47
Jun 29 04:56:13 tanzim-HP-Z238-Microtower-Workstation sshd\[28057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=88.214.26.47
Jun 29 04:56:16 tanzim-HP-Z238-Microtower-Workstation sshd\[28057\]: Failed password for invalid user admin from 88.214.26.47 port 51047 ssh2
...
2019-06-29 07:53:11
23.82.128.159 attack
(pop3d) Failed POP3 login from 23.82.128.159 (US/United States/-): 10 in the last 3600 secs
2019-06-29 07:53:42
181.30.26.40 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.26.40  user=gnats
Failed password for gnats from 181.30.26.40 port 47526 ssh2
Invalid user vps from 181.30.26.40 port 52892
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.30.26.40
Failed password for invalid user vps from 181.30.26.40 port 52892 ssh2
2019-06-29 08:02:33
211.214.160.164 attackbotsspam
Banned for posting to wp-login.php without referer {"redirect_to":"","user_email":"traveltocity@zohomail.eu","user_login":"traveltocityyy","wp-submit":"Register"}
2019-06-29 07:44:50
112.169.9.149 attackbots
Jun 29 01:26:01 vpn01 sshd\[829\]: Invalid user david from 112.169.9.149
Jun 29 01:26:01 vpn01 sshd\[829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.169.9.149
Jun 29 01:26:03 vpn01 sshd\[829\]: Failed password for invalid user david from 112.169.9.149 port 53666 ssh2
2019-06-29 08:00:05
61.191.252.218 attackbotsspam
'IP reached maximum auth failures for a one day block'
2019-06-29 08:12:57
177.130.138.225 attack
SMTP-sasl brute force
...
2019-06-29 07:54:58
34.219.163.162 attackbotsspam
As always with amazon web services
2019-06-29 07:52:54
188.166.226.209 attackbots
Jun 28 23:46:56 animalibera sshd[20651]: Invalid user xgridcontroller from 188.166.226.209 port 59618
...
2019-06-29 07:56:26

Recently Reported IPs

226.94.211.168 8.88.23.131 42.2.94.83 151.190.46.3
46.64.234.135 88.96.71.79 199.165.187.149 72.16.238.210
117.113.125.95 191.86.28.107 93.235.118.60 59.217.51.92
67.55.255.172 47.54.214.40 40.174.188.88 184.21.18.254
157.184.16.160 130.79.46.114 188.49.144.59 24.7.102.53