Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.120.142.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13673
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.120.142.144.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 10:00:26 CST 2025
;; MSG SIZE  rcvd: 108
Host info
144.142.120.142.in-addr.arpa domain name pointer bras-base-otwaon230qw-grc-43-142-120-142-144.dsl.bell.ca.
144.142.120.142.in-addr.arpa domain name pointer lnsm1-toronto12-142-120-142-144.internet.virginmobile.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
144.142.120.142.in-addr.arpa	name = bras-base-otwaon230qw-grc-43-142-120-142-144.dsl.bell.ca.
144.142.120.142.in-addr.arpa	name = lnsm1-toronto12-142-120-142-144.internet.virginmobile.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.72.164.54 attack
2020-08-05 14:08:05 Reject access to port(s):3389 2 times a day
2020-08-06 18:33:21
79.124.62.55 attack
TCP ports : 3389 / 3390 / 4400
2020-08-06 18:30:16
180.164.94.115 attackspam
Fail2Ban Ban Triggered
2020-08-06 18:14:07
184.154.189.90 attackbotsspam
Unauthorized connection attempt detected from IP address 184.154.189.90 to port 2404
2020-08-06 18:23:26
185.202.1.187 attackspambots
2020-08-05 08:35:27 Reject access to port(s):3389 6 times a day
2020-08-06 18:34:44
194.61.27.245 attack
TCP port : 3389
2020-08-06 18:17:09
191.235.89.132 attackbots
Port scan denied
2020-08-06 18:34:17
138.68.94.142 attackspam
 TCP (SYN) 138.68.94.142:48510 -> port 13357, len 44
2020-08-06 17:59:02
192.241.210.45 attackbots
firewall-block, port(s): 5094/tcp
2020-08-06 17:59:36
14.232.155.113 attackbots
20/8/6@01:20:07: FAIL: Alarm-Network address from=14.232.155.113
...
2020-08-06 18:12:01
49.235.192.120 attack
$f2bV_matches
2020-08-06 17:57:39
66.70.160.187 attackspam
66.70.160.187 - - \[06/Aug/2020:10:22:02 +0200\] "POST /wp-login.php HTTP/1.1" 200 9954 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
66.70.160.187 - - \[06/Aug/2020:10:22:04 +0200\] "POST /wp-login.php HTTP/1.1" 200 9823 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
...
2020-08-06 17:57:11
110.49.71.248 attack
2020-08-06 01:33:14.127699-0500  localhost sshd[53691]: Failed password for invalid user ~!@123 from 110.49.71.248 port 43364 ssh2
2020-08-06 18:17:29
84.38.187.194 attackbots
firewall-block, port(s): 33899/tcp
2020-08-06 18:28:30
51.83.216.207 attack
2020-08-05 11:49:49 Reject access to port(s):3389 1 times a day
2020-08-06 18:31:07

Recently Reported IPs

63.246.136.157 149.68.92.1 238.180.78.217 26.95.227.102
253.51.221.189 106.201.107.227 41.112.246.198 202.55.157.195
240.35.246.40 61.142.110.252 85.237.191.59 147.65.106.178
223.247.78.212 104.234.121.226 250.175.119.199 244.232.216.242
7.137.95.73 85.58.169.127 161.246.113.76 27.158.182.87