Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.130.159.117
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43396
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.130.159.117.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 05:24:06 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 117.159.130.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 142.130.159.117.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
201.249.89.102 attack
Dec 18 22:08:39 gw1 sshd[2347]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.249.89.102
Dec 18 22:08:41 gw1 sshd[2347]: Failed password for invalid user cronus from 201.249.89.102 port 39288 ssh2
...
2019-12-19 01:09:02
202.70.89.55 attackbotsspam
Dec 18 16:51:24 legacy sshd[24124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.70.89.55
Dec 18 16:51:26 legacy sshd[24124]: Failed password for invalid user nusser from 202.70.89.55 port 58356 ssh2
Dec 18 16:58:28 legacy sshd[24394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.70.89.55
...
2019-12-19 01:42:08
93.62.51.103 attack
Dec 18 07:17:36 auw2 sshd\[16589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=email.mimesi.com  user=root
Dec 18 07:17:38 auw2 sshd\[16589\]: Failed password for root from 93.62.51.103 port 42972 ssh2
Dec 18 07:23:17 auw2 sshd\[17123\]: Invalid user dilip from 93.62.51.103
Dec 18 07:23:17 auw2 sshd\[17123\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=email.mimesi.com
Dec 18 07:23:19 auw2 sshd\[17123\]: Failed password for invalid user dilip from 93.62.51.103 port 46083 ssh2
2019-12-19 01:33:12
116.196.117.154 attackbotsspam
Dec 18 17:50:11 lnxmail61 sshd[20806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.117.154
Dec 18 17:50:13 lnxmail61 sshd[20806]: Failed password for invalid user erpelding from 116.196.117.154 port 57970 ssh2
Dec 18 17:56:41 lnxmail61 sshd[21494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.196.117.154
2019-12-19 01:14:42
115.73.173.76 attackspam
1576679727 - 12/18/2019 15:35:27 Host: 115.73.173.76/115.73.173.76 Port: 445 TCP Blocked
2019-12-19 01:15:07
61.84.196.50 attackbots
Dec 18 15:48:42 legacy sshd[21718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.84.196.50
Dec 18 15:48:44 legacy sshd[21718]: Failed password for invalid user armey from 61.84.196.50 port 47422 ssh2
Dec 18 15:55:34 legacy sshd[21976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.84.196.50
...
2019-12-19 01:35:32
198.108.66.217 attack
8883/tcp 7547/tcp 5672/tcp...
[2019-10-28/12-18]8pkt,7pt.(tcp),1pt.(udp)
2019-12-19 01:36:25
51.254.33.188 attack
Dec 18 07:27:53 wbs sshd\[30258\]: Invalid user marsuri from 51.254.33.188
Dec 18 07:27:53 wbs sshd\[30258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.ip-51-254-33.eu
Dec 18 07:27:55 wbs sshd\[30258\]: Failed password for invalid user marsuri from 51.254.33.188 port 42798 ssh2
Dec 18 07:32:59 wbs sshd\[30746\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.ip-51-254-33.eu  user=root
Dec 18 07:33:01 wbs sshd\[30746\]: Failed password for root from 51.254.33.188 port 50488 ssh2
2019-12-19 01:46:42
40.92.253.83 attackbots
Dec 18 18:29:25 debian-2gb-vpn-nbg1-1 kernel: [1061329.836843] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.253.83 DST=78.46.192.101 LEN=48 TOS=0x00 PREC=0x00 TTL=111 ID=22824 DF PROTO=TCP SPT=20155 DPT=25 WINDOW=8192 RES=0x00 SYN URGP=0
2019-12-19 01:31:51
167.172.42.210 attackspambots
Chat Spam
2019-12-19 01:41:07
178.175.132.72 attack
0,88-00/00 [bc01/m11] PostRequest-Spammer scoring: maputo01_x2b
2019-12-19 01:21:27
51.255.162.65 attackspam
Dec 18 12:24:24 linuxvps sshd\[1019\]: Invalid user kaci from 51.255.162.65
Dec 18 12:24:24 linuxvps sshd\[1019\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.162.65
Dec 18 12:24:26 linuxvps sshd\[1019\]: Failed password for invalid user kaci from 51.255.162.65 port 36734 ssh2
Dec 18 12:29:25 linuxvps sshd\[4525\]: Invalid user dbus from 51.255.162.65
Dec 18 12:29:25 linuxvps sshd\[4525\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.162.65
2019-12-19 01:41:38
182.61.167.211 attack
ssh failed login
2019-12-19 01:26:06
40.92.73.14 attackspambots
Dec 18 17:35:25 debian-2gb-vpn-nbg1-1 kernel: [1058089.795204] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.73.14 DST=78.46.192.101 LEN=52 TOS=0x02 PREC=0x00 TTL=111 ID=12156 DF PROTO=TCP SPT=35203 DPT=25 WINDOW=8192 RES=0x00 CWR ECE SYN URGP=0
2019-12-19 01:16:15
103.76.22.118 attack
Dec 18 12:32:40 plusreed sshd[30137]: Invalid user clark from 103.76.22.118
...
2019-12-19 01:45:09

Recently Reported IPs

209.156.197.37 172.75.120.203 109.226.151.74 3.144.125.187
9.66.98.134 50.178.155.249 129.89.229.200 90.0.27.33
59.228.174.0 89.57.147.131 93.223.39.99 254.139.21.204
22.161.195.232 43.90.8.38 71.203.150.200 71.112.115.172
217.209.30.198 21.146.149.190 208.51.194.179 197.59.193.186