Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.120.145.144
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24402
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.120.145.144.		IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021202 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 10:05:09 CST 2022
;; MSG SIZE  rcvd: 108
Host info
144.145.120.142.in-addr.arpa domain name pointer lnsm1-torontoxn-142-120-145-144.internet.virginmobile.ca.
144.145.120.142.in-addr.arpa domain name pointer lnsm1-toronto06-142-120-145-144.internet.virginmobile.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
144.145.120.142.in-addr.arpa	name = lnsm1-torontoxn-142-120-145-144.internet.virginmobile.ca.
144.145.120.142.in-addr.arpa	name = lnsm1-toronto06-142-120-145-144.internet.virginmobile.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.138.74.116 attack
E-Mail Spam (RBL) [REJECTED]
2020-09-20 20:44:54
122.14.200.231 attack
10 attempts against mh-pma-try-ban on river
2020-09-20 20:49:40
116.108.54.54 attack
Lines containing failures of 116.108.54.54
Sep 19 19:00:06 mellenthin sshd[20987]: Did not receive identification string from 116.108.54.54 port 57511
Sep 19 19:00:08 mellenthin sshd[20988]: Invalid user admin1 from 116.108.54.54 port 57710
Sep 19 19:00:08 mellenthin sshd[20988]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.108.54.54
Sep 19 19:00:10 mellenthin sshd[20988]: Failed password for invalid user admin1 from 116.108.54.54 port 57710 ssh2
Sep 19 19:00:11 mellenthin sshd[20988]: Connection closed by invalid user admin1 116.108.54.54 port 57710 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=116.108.54.54
2020-09-20 21:06:11
101.99.81.155 attack
port scan and connect, tcp 23 (telnet)
2020-09-20 20:51:27
222.186.42.137 attack
Sep 20 10:00:40 vps46666688 sshd[32686]: Failed password for root from 222.186.42.137 port 60746 ssh2
...
2020-09-20 21:10:12
180.71.255.167 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 21:13:39
186.29.180.192 attack
Scanning
2020-09-20 21:11:12
190.153.27.98 attackbotsspam
Sep 20 13:01:18 vps sshd[10558]: Failed password for root from 190.153.27.98 port 47360 ssh2
Sep 20 13:12:15 vps sshd[11271]: Failed password for root from 190.153.27.98 port 33248 ssh2
...
2020-09-20 20:52:26
203.218.249.90 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 20:59:29
85.224.217.221 attack
Sep 19 17:00:19 scw-focused-cartwright sshd[26247]: Failed password for root from 85.224.217.221 port 41857 ssh2
2020-09-20 20:58:20
223.17.161.175 attackspam
IP 223.17.161.175 attacked honeypot on port: 22 at 9/19/2020 5:00:14 PM
2020-09-20 20:57:18
90.214.130.79 attackbotsspam
Telnetd brute force attack detected by fail2ban
2020-09-20 20:43:22
46.101.113.206 attackspam
$f2bV_matches
2020-09-20 21:17:02
191.177.219.85 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 21:13:08
154.209.8.10 attack
Sep 20 15:01:39 eventyay sshd[17846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.209.8.10
Sep 20 15:01:39 eventyay sshd[17850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.209.8.10
Sep 20 15:01:40 eventyay sshd[17846]: Failed password for invalid user admin from 154.209.8.10 port 46400 ssh2
...
2020-09-20 21:07:29

Recently Reported IPs

142.147.117.170 142.154.13.124 142.132.143.108 142.154.7.11
142.154.87.255 142.154.66.182 142.163.231.42 142.250.65.196
142.252.26.27 142.247.24.223 142.247.224.157 142.252.26.87
142.252.198.23 142.186.64.210 142.252.223.250 142.252.26.237
142.44.207.144 142.252.223.172 142.44.104.14 142.44.207.148