Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.125.130.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47477
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.125.130.199.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021501 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 11:50:38 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 199.130.125.142.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 142.125.130.199.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
82.102.173.83 attackspam
Jan  1 15:52:23 debian-2gb-nbg1-2 kernel: \[149675.502826\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=82.102.173.83 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x60 TTL=244 ID=54254 PROTO=TCP SPT=40228 DPT=8280 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-02 00:20:40
51.255.49.92 attack
Jan  1 17:50:18 server sshd\[26861\]: Invalid user ledora from 51.255.49.92
Jan  1 17:50:18 server sshd\[26861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.ip-51-255-49.eu 
Jan  1 17:50:20 server sshd\[26861\]: Failed password for invalid user ledora from 51.255.49.92 port 45105 ssh2
Jan  1 17:52:31 server sshd\[27147\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.ip-51-255-49.eu  user=root
Jan  1 17:52:33 server sshd\[27147\]: Failed password for root from 51.255.49.92 port 53850 ssh2
...
2020-01-02 00:16:38
45.136.109.87 attackspambots
01/01/2020-10:19:58.588491 45.136.109.87 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-01-02 00:16:52
46.151.192.226 attackbots
Unauthorised access (Jan  1) SRC=46.151.192.226 LEN=44 TTL=245 ID=8701 TCP DPT=445 WINDOW=1024 SYN
2020-01-02 00:15:23
82.140.230.114 attackbots
scan z
2020-01-02 00:06:46
1.160.162.30 attack
Jan  1 15:53:02 grey postfix/smtpd\[24667\]: NOQUEUE: reject: RCPT from 1-160-162-30.dynamic-ip.hinet.net\[1.160.162.30\]: 554 5.7.1 Service unavailable\; Client host \[1.160.162.30\] blocked using bl.spamcop.net\; Blocked - see https://www.spamcop.net/bl.shtml\?1.160.162.30\; from=\ to=\ proto=ESMTP helo=\
...
2020-01-02 00:01:56
41.142.245.48 attackbotsspam
Autoban   41.142.245.48 AUTH/CONNECT
2020-01-02 00:21:15
222.186.175.147 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147  user=root
Failed password for root from 222.186.175.147 port 12034 ssh2
Failed password for root from 222.186.175.147 port 12034 ssh2
Failed password for root from 222.186.175.147 port 12034 ssh2
Failed password for root from 222.186.175.147 port 12034 ssh2
2020-01-02 00:24:09
91.235.198.219 attackbotsspam
Jan  1 15:52:55 grey postfix/smtpd\[23589\]: NOQUEUE: reject: RCPT from unknown\[91.235.198.219\]: 554 5.7.1 Service unavailable\; Client host \[91.235.198.219\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[91.235.198.219\]\; from=\ to=\ proto=ESMTP helo=\<\[91.235.198.219\]\>
...
2020-01-02 00:05:38
94.67.95.177 attackbots
B: /wp-login.php attack
2020-01-02 00:27:54
80.211.61.236 attackspambots
Jan  1 16:55:12 MK-Soft-Root1 sshd[32541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.61.236 
Jan  1 16:55:14 MK-Soft-Root1 sshd[32541]: Failed password for invalid user www159753 from 80.211.61.236 port 45588 ssh2
...
2020-01-02 00:02:16
90.161.220.136 attackspam
Jan  1 15:52:18 [host] sshd[2065]: Invalid user hedger from 90.161.220.136
Jan  1 15:52:18 [host] sshd[2065]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=90.161.220.136
Jan  1 15:52:20 [host] sshd[2065]: Failed password for invalid user hedger from 90.161.220.136 port 43623 ssh2
2020-01-02 00:19:34
195.97.19.2 attack
Unauthorized connection attempt from IP address 195.97.19.2 on Port 445(SMB)
2020-01-02 00:24:27
112.85.42.174 attackspam
Jan  1 15:47:41 localhost sshd\[39111\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.174  user=root
Jan  1 15:47:43 localhost sshd\[39111\]: Failed password for root from 112.85.42.174 port 50423 ssh2
Jan  1 15:47:48 localhost sshd\[39111\]: Failed password for root from 112.85.42.174 port 50423 ssh2
Jan  1 15:47:51 localhost sshd\[39111\]: Failed password for root from 112.85.42.174 port 50423 ssh2
Jan  1 15:47:55 localhost sshd\[39111\]: Failed password for root from 112.85.42.174 port 50423 ssh2
...
2020-01-02 00:07:46
63.81.87.234 attackbots
Postfix RBL failed
2020-01-02 00:28:33

Recently Reported IPs

51.113.104.221 149.143.148.83 194.126.6.125 32.202.216.109
42.23.227.139 244.128.121.54 126.250.66.73 171.153.54.48
28.120.183.255 150.195.235.200 241.44.170.215 196.163.158.19
242.74.180.105 75.194.45.191 29.115.96.159 231.216.137.123
232.62.54.94 76.160.40.250 30.83.138.222 19.128.117.225