Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Toronto

Region: Ontario

Country: Canada

Internet Service Provider: Bell

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.120.80.73
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.120.80.73.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010401 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 05 04:40:42 CST 2025
;; MSG SIZE  rcvd: 106
Host info
73.80.120.142.in-addr.arpa domain name pointer lnsm1-torontoxn-142-120-80-73.internet.virginmobile.ca.
73.80.120.142.in-addr.arpa domain name pointer lnsm1-toronto27-142-120-80-73.internet.virginmobile.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
73.80.120.142.in-addr.arpa	name = lnsm1-torontoxn-142-120-80-73.internet.virginmobile.ca.
73.80.120.142.in-addr.arpa	name = lnsm1-toronto27-142-120-80-73.internet.virginmobile.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
218.92.0.246 attackbotsspam
Sep 18 22:03:45 abendstille sshd\[8875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Sep 18 22:03:46 abendstille sshd\[8891\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.246  user=root
Sep 18 22:03:47 abendstille sshd\[8875\]: Failed password for root from 218.92.0.246 port 45218 ssh2
Sep 18 22:03:48 abendstille sshd\[8891\]: Failed password for root from 218.92.0.246 port 56413 ssh2
Sep 18 22:03:50 abendstille sshd\[8875\]: Failed password for root from 218.92.0.246 port 45218 ssh2
...
2020-09-19 04:16:47
178.62.37.78 attack
5x Failed Password
2020-09-19 04:30:56
45.129.33.12 attackspambots
Port scan
2020-09-19 04:32:07
88.202.239.162 attackbotsspam
E-Mail Spam (RBL) [REJECTED]
2020-09-19 04:13:05
88.202.239.153 attack
E-Mail Spam (RBL) [REJECTED]
2020-09-19 04:08:54
200.60.11.195 attackbotsspam
Unauthorized connection attempt from IP address 200.60.11.195 on Port 445(SMB)
2020-09-19 04:43:47
178.150.182.136 attackbotsspam
1600448561 - 09/18/2020 19:02:41 Host: 178.150.182.136/178.150.182.136 Port: 445 TCP Blocked
2020-09-19 04:30:12
211.57.153.250 attack
Sep 18 19:55:19 vm1 sshd[10419]: Failed password for root from 211.57.153.250 port 41675 ssh2
...
2020-09-19 04:26:16
119.82.224.75 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-09-19 04:26:35
182.61.29.203 attack
20 attempts against mh-ssh on pcx
2020-09-19 04:28:14
95.57.77.129 attackbotsspam
Automatic report - Port Scan Attack
2020-09-19 04:39:04
120.131.3.91 attack
Found on   CINS badguys     / proto=6  .  srcport=52338  .  dstport=17489  .     (2881)
2020-09-19 04:17:51
193.247.213.196 attack
Sep 18 16:17:14 ny01 sshd[1522]: Failed password for root from 193.247.213.196 port 48426 ssh2
Sep 18 16:21:28 ny01 sshd[2114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.247.213.196
Sep 18 16:21:30 ny01 sshd[2114]: Failed password for invalid user teamspeak from 193.247.213.196 port 60416 ssh2
2020-09-19 04:34:57
178.128.194.144 attackbotsspam
REQUESTED PAGE: /.git/config
2020-09-19 04:29:53
5.196.94.68 attack
Repeated brute force against a port
2020-09-19 04:44:54

Recently Reported IPs

16.241.114.109 62.48.151.164 17.252.121.218 193.199.116.83
39.30.122.251 144.137.128.64 143.132.254.153 57.245.135.212
79.36.238.46 215.207.159.164 228.21.106.149 202.159.191.70
71.199.139.172 202.11.133.235 22.43.151.224 22.28.56.245
95.215.29.163 7.3.68.43 119.34.224.255 37.73.201.174