Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.124.53.187
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48315
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.124.53.187.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 20:23:34 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 187.53.124.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 142.124.53.187.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
61.140.199.211 attack
1433/tcp
[2019-10-24]1pkt
2019-10-24 15:27:03
191.180.137.57 attackspambots
5555/tcp
[2019-10-24]1pkt
2019-10-24 15:20:24
121.141.5.199 attackspam
SSH Bruteforce
2019-10-24 15:37:25
190.6.197.162 attack
firewall-block, port(s): 80/tcp
2019-10-24 15:54:11
36.255.99.63 attack
445/tcp 445/tcp 445/tcp
[2019-10-24]3pkt
2019-10-24 15:28:27
182.254.135.14 attack
Oct 24 08:03:30 tux-35-217 sshd\[4394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.135.14  user=root
Oct 24 08:03:32 tux-35-217 sshd\[4394\]: Failed password for root from 182.254.135.14 port 51076 ssh2
Oct 24 08:07:58 tux-35-217 sshd\[4439\]: Invalid user dp from 182.254.135.14 port 58632
Oct 24 08:07:58 tux-35-217 sshd\[4439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.254.135.14
...
2019-10-24 15:13:09
45.120.217.172 attackbotsspam
Oct 24 08:51:49 [host] sshd[5616]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.120.217.172  user=root
Oct 24 08:51:50 [host] sshd[5616]: Failed password for root from 45.120.217.172 port 51966 ssh2
Oct 24 08:56:02 [host] sshd[5671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.120.217.172  user=root
2019-10-24 15:16:00
188.235.146.137 attack
Automatic report - Banned IP Access
2019-10-24 15:25:08
117.50.5.83 attackspambots
Automatic report - Banned IP Access
2019-10-24 15:32:39
103.56.113.201 attack
Oct 24 08:40:12 SilenceServices sshd[3092]: Failed password for root from 103.56.113.201 port 40126 ssh2
Oct 24 08:44:32 SilenceServices sshd[4220]: Failed password for root from 103.56.113.201 port 59173 ssh2
2019-10-24 15:49:30
66.240.236.119 attack
Scanning (more than 2 packets) random ports - tries to find possible vulnerable services
2019-10-24 15:17:58
186.93.158.127 attackspam
1433/tcp
[2019-10-24]1pkt
2019-10-24 15:31:59
184.168.193.103 attack
Automatic report - XMLRPC Attack
2019-10-24 15:28:56
117.50.49.57 attackspam
Invalid user system from 117.50.49.57 port 48872
2019-10-24 15:32:11
114.33.24.8 attackspam
Port scan: Attack repeated for 24 hours
2019-10-24 15:20:05

Recently Reported IPs

165.66.155.75 137.108.248.136 116.32.45.199 114.38.232.8
44.129.0.233 13.124.46.62 163.102.82.176 41.178.245.221
90.243.176.91 116.204.30.96 167.71.209.88 72.48.99.254
200.230.48.158 51.14.251.182 219.231.68.12 213.175.187.232
239.131.107.164 90.202.48.106 127.6.208.104 149.76.148.49