Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.117.242.104
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29112
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.117.242.104.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 21:05:43 CST 2025
;; MSG SIZE  rcvd: 108
Host info
104.242.117.142.in-addr.arpa domain name pointer lnsm1-montreal01-142-117-242-104.internet.virginmobile.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
104.242.117.142.in-addr.arpa	name = lnsm1-montreal01-142-117-242-104.internet.virginmobile.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
2.184.52.204 attackbotsspam
Unauthorized IMAP connection attempt
2020-07-21 21:25:22
129.211.7.173 attackspambots
Jul 21 05:50:24 ns382633 sshd\[13484\]: Invalid user jacob from 129.211.7.173 port 35836
Jul 21 05:50:24 ns382633 sshd\[13484\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.7.173
Jul 21 05:50:25 ns382633 sshd\[13484\]: Failed password for invalid user jacob from 129.211.7.173 port 35836 ssh2
Jul 21 06:00:27 ns382633 sshd\[15221\]: Invalid user ldc from 129.211.7.173 port 43068
Jul 21 06:00:27 ns382633 sshd\[15221\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.7.173
2020-07-21 21:01:01
137.74.132.171 attack
2020-07-21T16:15:28.671234mail.standpoint.com.ua sshd[10594]: Invalid user lxc from 137.74.132.171 port 32830
2020-07-21T16:15:28.674049mail.standpoint.com.ua sshd[10594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip171.ip-137-74-132.eu
2020-07-21T16:15:28.671234mail.standpoint.com.ua sshd[10594]: Invalid user lxc from 137.74.132.171 port 32830
2020-07-21T16:15:30.374355mail.standpoint.com.ua sshd[10594]: Failed password for invalid user lxc from 137.74.132.171 port 32830 ssh2
2020-07-21T16:19:41.890016mail.standpoint.com.ua sshd[11197]: Invalid user guest from 137.74.132.171 port 46490
...
2020-07-21 21:24:22
220.177.92.227 attackspam
Invalid user sbserver from 220.177.92.227 port 16333
2020-07-21 20:30:17
182.61.11.3 attackbotsspam
Jul 21 12:22:12 onepixel sshd[2372943]: Invalid user ts3 from 182.61.11.3 port 46928
Jul 21 12:22:12 onepixel sshd[2372943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.11.3 
Jul 21 12:22:12 onepixel sshd[2372943]: Invalid user ts3 from 182.61.11.3 port 46928
Jul 21 12:22:14 onepixel sshd[2372943]: Failed password for invalid user ts3 from 182.61.11.3 port 46928 ssh2
Jul 21 12:23:54 onepixel sshd[2373805]: Invalid user tanvir from 182.61.11.3 port 32970
2020-07-21 20:36:49
180.76.12.17 attackbots
ddos
2020-07-21 20:32:03
138.68.21.125 attackspam
Jul 21 14:14:29 server sshd[29859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.21.125
Jul 21 14:14:31 server sshd[29859]: Failed password for invalid user apl from 138.68.21.125 port 38880 ssh2
Jul 21 14:19:43 server sshd[30290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.21.125
...
2020-07-21 20:51:27
198.23.251.238 attackspam
Jul 21 14:24:33 vps sshd[375568]: Failed password for invalid user ftp_test from 198.23.251.238 port 50482 ssh2
Jul 21 14:30:05 vps sshd[401932]: Invalid user vinicius from 198.23.251.238 port 53374
Jul 21 14:30:05 vps sshd[401932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.23.251.238
Jul 21 14:30:08 vps sshd[401932]: Failed password for invalid user vinicius from 198.23.251.238 port 53374 ssh2
Jul 21 14:35:41 vps sshd[426337]: Invalid user ginger from 198.23.251.238 port 57758
...
2020-07-21 20:36:17
71.6.167.142 attackspambots
Unauthorized connection attempt detected from IP address 71.6.167.142 to port 11300
2020-07-21 20:56:57
200.116.175.40 attackspam
Invalid user rushi from 200.116.175.40 port 25757
2020-07-21 20:57:50
164.132.73.220 attack
Jul 21 08:17:07 NPSTNNYC01T sshd[15193]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.73.220
Jul 21 08:17:09 NPSTNNYC01T sshd[15193]: Failed password for invalid user landi from 164.132.73.220 port 38532 ssh2
Jul 21 08:21:21 NPSTNNYC01T sshd[15543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.73.220
...
2020-07-21 20:42:14
49.232.152.3 attackspambots
Jul 21 14:44:59 abendstille sshd\[10321\]: Invalid user lina from 49.232.152.3
Jul 21 14:44:59 abendstille sshd\[10321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.152.3
Jul 21 14:45:01 abendstille sshd\[10321\]: Failed password for invalid user lina from 49.232.152.3 port 47280 ssh2
Jul 21 14:50:48 abendstille sshd\[16368\]: Invalid user kfserver from 49.232.152.3
Jul 21 14:50:48 abendstille sshd\[16368\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.152.3
...
2020-07-21 20:51:04
91.103.248.23 attackspambots
Jul 21 11:26:29 electroncash sshd[37914]: Invalid user administrator from 91.103.248.23 port 56396
Jul 21 11:26:29 electroncash sshd[37914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.103.248.23 
Jul 21 11:26:29 electroncash sshd[37914]: Invalid user administrator from 91.103.248.23 port 56396
Jul 21 11:26:31 electroncash sshd[37914]: Failed password for invalid user administrator from 91.103.248.23 port 56396 ssh2
Jul 21 11:31:07 electroncash sshd[39211]: Invalid user administrator from 91.103.248.23 port 43616
...
2020-07-21 20:40:29
24.189.134.37 attackspambots
port
2020-07-21 20:49:07
180.183.251.242 attack
'IP reached maximum auth failures for a one day block'
2020-07-21 20:33:10

Recently Reported IPs

156.107.139.15 29.40.225.65 90.18.81.2 3.250.71.128
42.146.77.3 182.216.58.117 146.177.172.39 32.252.30.57
250.83.80.155 159.92.244.124 45.189.75.62 132.33.86.6
61.183.8.23 174.253.92.199 26.22.96.95 13.188.243.143
232.227.191.23 31.194.167.236 122.233.35.186 143.237.62.133