Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.130.54.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.130.54.254.			IN	A

;; AUTHORITY SECTION:
.			438	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 10:42:48 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 254.54.130.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 142.130.54.254.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
203.76.132.106 attackspambots
Honeypot attack, port: 445, PTR: til91.hclinfinet.com.
2020-03-23 03:52:27
77.247.110.25 attackbots
firewall-block, port(s): 5060/udp
2020-03-23 03:54:47
27.67.32.17 attackspambots
Honeypot attack, port: 445, PTR: localhost.
2020-03-23 03:59:36
181.129.161.28 attackbotsspam
" "
2020-03-23 03:37:02
180.76.98.25 attackbots
SSH bruteforce
2020-03-23 03:38:29
20.184.24.149 attackbots
Invalid user bk from 20.184.24.149 port 44538
2020-03-23 03:30:04
49.234.143.64 attack
Mar 22 20:13:53 eventyay sshd[10560]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.143.64
Mar 22 20:13:55 eventyay sshd[10560]: Failed password for invalid user brittne from 49.234.143.64 port 45438 ssh2
Mar 22 20:19:19 eventyay sshd[10770]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.143.64
...
2020-03-23 03:25:10
218.92.0.168 attack
$f2bV_matches
2020-03-23 04:03:24
218.92.0.191 attackspam
Mar 22 20:57:50 dcd-gentoo sshd[18686]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Mar 22 20:57:53 dcd-gentoo sshd[18686]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Mar 22 20:57:50 dcd-gentoo sshd[18686]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Mar 22 20:57:53 dcd-gentoo sshd[18686]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Mar 22 20:57:50 dcd-gentoo sshd[18686]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Mar 22 20:57:53 dcd-gentoo sshd[18686]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Mar 22 20:57:53 dcd-gentoo sshd[18686]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 62370 ssh2
...
2020-03-23 03:58:11
42.118.242.189 attack
$f2bV_matches
2020-03-23 03:28:41
119.4.225.31 attackspam
Unauthorized SSH login attempts
2020-03-23 03:41:28
159.65.104.150 attack
159.65.104.150 - - [22/Mar/2020:18:45:45 +0100] "GET /wp-login.php HTTP/1.1" 200 6582 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.65.104.150 - - [22/Mar/2020:18:45:46 +0100] "POST /wp-login.php HTTP/1.1" 200 7362 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
159.65.104.150 - - [22/Mar/2020:18:45:48 +0100] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-03-23 04:01:29
221.232.224.75 attackbots
Invalid user kamilla from 221.232.224.75 port 48896
2020-03-23 03:32:38
101.99.20.59 attackspambots
Invalid user petronella from 101.99.20.59 port 35576
2020-03-23 03:44:45
106.54.189.93 attackspam
Mar 22 20:17:00 localhost sshd\[5511\]: Invalid user kf from 106.54.189.93 port 48390
Mar 22 20:17:00 localhost sshd\[5511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.189.93
Mar 22 20:17:02 localhost sshd\[5511\]: Failed password for invalid user kf from 106.54.189.93 port 48390 ssh2
2020-03-23 03:42:40

Recently Reported IPs

73.82.185.228 245.92.152.207 108.137.35.13 140.213.62.173
83.98.5.102 235.214.42.183 57.211.89.81 175.194.177.20
151.99.109.197 195.235.124.208 90.67.39.253 172.217.14.234
240e:fe:280b:297:cff:4367:8fe0:3171 188.146.103.92 212.69.224.141 218.149.159.128
113.255.18.99 45.13.39.50 188.232.170.94 231.10.213.217