Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.131.200.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63067
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.131.200.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 04:20:56 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 42.200.131.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.200.131.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
92.118.160.17 attackspambots
5984/tcp 67/tcp 5916/tcp...
[2019-07-13/09-13]154pkt,69pt.(tcp),8pt.(udp),2tp.(icmp)
2019-09-13 21:07:32
103.61.198.122 attackbotsspam
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-13 21:06:22
108.162.246.21 attackbots
Sep 13 13:19:27 lenivpn01 kernel: \[606363.761328\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=108.162.246.21 DST=195.201.121.15 LEN=52 TOS=0x00 PREC=0x00 TTL=51 ID=9912 DF PROTO=TCP SPT=27166 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 
Sep 13 13:19:28 lenivpn01 kernel: \[606364.781630\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=108.162.246.21 DST=195.201.121.15 LEN=52 TOS=0x00 PREC=0x00 TTL=51 ID=9913 DF PROTO=TCP SPT=27166 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 
Sep 13 13:19:30 lenivpn01 kernel: \[606366.829597\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:2f:6c:1b:d2:74:7f:6e:37:e3:08:00 SRC=108.162.246.21 DST=195.201.121.15 LEN=52 TOS=0x00 PREC=0x00 TTL=51 ID=9914 DF PROTO=TCP SPT=27166 DPT=443 WINDOW=29200 RES=0x00 SYN URGP=0 
...
2019-09-13 20:57:16
37.79.254.216 attackbotsspam
Sep 13 08:28:19 TORMINT sshd\[21154\]: Invalid user myftp from 37.79.254.216
Sep 13 08:28:19 TORMINT sshd\[21154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.79.254.216
Sep 13 08:28:21 TORMINT sshd\[21154\]: Failed password for invalid user myftp from 37.79.254.216 port 53522 ssh2
...
2019-09-13 20:38:45
69.94.133.136 attackspam
Spam
2019-09-13 20:47:00
178.128.52.128 attackbots
Hits on port : 8088
2019-09-13 20:51:40
60.51.82.7 attackspam
Automatic report - Port Scan Attack
2019-09-13 20:37:29
183.83.73.140 attackspam
Unauthorised access (Sep 13) SRC=183.83.73.140 LEN=52 PREC=0x20 TTL=51 ID=14629 DF TCP DPT=445 WINDOW=8192 SYN
2019-09-13 20:51:07
58.233.175.12 attackspam
Sep 13 12:49:08 rdssrv1 sshd[19935]: Failed password for r.r from 58.233.175.12 port 39412 ssh2
Sep 13 12:49:10 rdssrv1 sshd[19935]: Failed password for r.r from 58.233.175.12 port 39412 ssh2
Sep 13 12:49:13 rdssrv1 sshd[19935]: Failed password for r.r from 58.233.175.12 port 39412 ssh2
Sep 13 12:49:15 rdssrv1 sshd[19935]: Failed password for r.r from 58.233.175.12 port 39412 ssh2
Sep 13 12:49:18 rdssrv1 sshd[19935]: Failed password for r.r from 58.233.175.12 port 39412 ssh2
Sep 13 12:49:20 rdssrv1 sshd[19935]: Failed password for r.r from 58.233.175.12 port 39412 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=58.233.175.12
2019-09-13 20:37:57
45.173.12.18 attackspambots
Spam
2019-09-13 20:52:46
217.112.128.43 attackbotsspam
Sent Mail to address hacked/leaked/bought from crystalproductions.cz between 2011 and 2018
2019-09-13 20:44:57
89.19.175.117 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-13 21:09:08
51.91.10.236 attackspambots
2019-09-13T12:19:54.244032beta postfix/smtpd[14236]: NOQUEUE: reject: RCPT from mta0.gaven.team[51.91.10.236]: 450 4.7.1 : Helo command rejected: Host not found; from= to= proto=ESMTP helo=
2019-09-13T12:19:54.776461beta postfix/smtpd[14236]: NOQUEUE: reject: RCPT from mta0.gaven.team[51.91.10.236]: 450 4.7.1 : Helo command rejected: Host not found; from= to=<4554A4BD.4090007@rncbc.org> proto=ESMTP helo=
2019-09-13T12:19:55.311547beta postfix/smtpd[14236]: NOQUEUE: reject: RCPT from mta0.gaven.team[51.91.10.236]: 450 4.7.1 : Helo command rejected: Host not found; from= to=<4554D59D.2090404@rncbc.org> proto=ESMTP helo=
...
2019-09-13 20:38:26
112.85.42.237 attackbots
2019-09-13T12:22:40.725167abusebot-2.cloudsearch.cf sshd\[8138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.237  user=root
2019-09-13 20:39:57
134.209.105.46 attack
fail2ban honeypot
2019-09-13 21:18:21

Recently Reported IPs

192.234.29.127 243.187.197.112 97.246.131.241 167.102.112.218
20.4.187.216 35.3.50.134 97.162.113.201 20.0.92.116
97.186.13.24 200.1.234.135 42.16.132.1 80.131.128.242
40.209.109.90 145.161.158.33 39.158.140.104 133.105.97.101
80.23.15.102 59.14.45.16 33.187.186.58 49.109.187.121