Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Toronto

Region: Ontario

Country: Canada

Internet Service Provider: Telus

Hostname: unknown

Organization: TELUS Communications Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.131.30.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25294
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.131.30.19.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Aug 23 01:54:23 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 19.30.131.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 19.30.131.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
160.155.53.22 attackspambots
Aug 25 22:16:10 h2779839 sshd[6919]: Invalid user test from 160.155.53.22 port 57250
Aug 25 22:16:10 h2779839 sshd[6919]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.155.53.22
Aug 25 22:16:10 h2779839 sshd[6919]: Invalid user test from 160.155.53.22 port 57250
Aug 25 22:16:13 h2779839 sshd[6919]: Failed password for invalid user test from 160.155.53.22 port 57250 ssh2
Aug 25 22:20:52 h2779839 sshd[7002]: Invalid user zsy from 160.155.53.22 port 41372
Aug 25 22:20:52 h2779839 sshd[7002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.155.53.22
Aug 25 22:20:52 h2779839 sshd[7002]: Invalid user zsy from 160.155.53.22 port 41372
Aug 25 22:20:54 h2779839 sshd[7002]: Failed password for invalid user zsy from 160.155.53.22 port 41372 ssh2
Aug 25 22:25:23 h2779839 sshd[7096]: Invalid user george from 160.155.53.22 port 49632
...
2020-08-26 04:27:55
46.200.24.91 attackspam
Unauthorized connection attempt from IP address 46.200.24.91 on Port 445(SMB)
2020-08-26 04:49:45
206.41.172.95 attackspambots
Unauthorised use of XMLRPC
2020-08-26 04:33:08
14.146.94.21 attackspambots
2020-08-25 19:42:31,012 fail2ban.actions        [937]: NOTICE  [sshd] Ban 14.146.94.21
2020-08-25 20:17:23,431 fail2ban.actions        [937]: NOTICE  [sshd] Ban 14.146.94.21
2020-08-25 20:51:38,431 fail2ban.actions        [937]: NOTICE  [sshd] Ban 14.146.94.21
2020-08-25 21:27:21,673 fail2ban.actions        [937]: NOTICE  [sshd] Ban 14.146.94.21
2020-08-25 22:01:54,560 fail2ban.actions        [937]: NOTICE  [sshd] Ban 14.146.94.21
...
2020-08-26 04:37:44
193.37.214.80 attackbotsspam
(mod_security) mod_security (id:218500) triggered by 193.37.214.80 (BG/Bulgaria/test221.vps-ag.com): 5 in the last 3600 secs
2020-08-26 04:22:40
106.51.44.6 attack
Aug 25 20:13:05 instance-2 sshd[21775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.44.6 
Aug 25 20:13:06 instance-2 sshd[21775]: Failed password for invalid user user from 106.51.44.6 port 34403 ssh2
Aug 25 20:18:42 instance-2 sshd[21977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.44.6
2020-08-26 04:30:11
86.60.41.192 attackspambots
Port scan: Attack repeated for 24 hours
2020-08-26 04:59:27
106.54.128.79 attack
Time:     Tue Aug 25 20:17:23 2020 +0000
IP:       106.54.128.79 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 25 19:54:56 pv-14-ams2 sshd[7648]: Invalid user suncong from 106.54.128.79 port 48684
Aug 25 19:54:58 pv-14-ams2 sshd[7648]: Failed password for invalid user suncong from 106.54.128.79 port 48684 ssh2
Aug 25 20:11:35 pv-14-ams2 sshd[29048]: Invalid user nrpe from 106.54.128.79 port 55152
Aug 25 20:11:36 pv-14-ams2 sshd[29048]: Failed password for invalid user nrpe from 106.54.128.79 port 55152 ssh2
Aug 25 20:17:20 pv-14-ams2 sshd[14886]: Invalid user installer from 106.54.128.79 port 58420
2020-08-26 04:26:57
27.110.165.155 attackspam
Unauthorized connection attempt from IP address 27.110.165.155 on Port 445(SMB)
2020-08-26 05:01:30
54.39.133.91 attackbotsspam
Time:     Tue Aug 25 20:05:12 2020 +0000
IP:       54.39.133.91 (CA/Canada/ns565253.ip-54-39-133.net)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Aug 25 19:56:45 hosting sshd[21348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.133.91  user=root
Aug 25 19:56:46 hosting sshd[21348]: Failed password for root from 54.39.133.91 port 40114 ssh2
Aug 25 20:01:45 hosting sshd[21758]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.133.91  user=ftp
Aug 25 20:01:47 hosting sshd[21758]: Failed password for ftp from 54.39.133.91 port 37064 ssh2
Aug 25 20:05:09 hosting sshd[21987]: Invalid user hydro from 54.39.133.91 port 45540
2020-08-26 04:59:05
46.217.47.75 attackbots
Unauthorized connection attempt from IP address 46.217.47.75 on Port 445(SMB)
2020-08-26 04:59:56
107.161.177.66 attackbotsspam
www.fahrschule-mihm.de 107.161.177.66 [25/Aug/2020:22:02:00 +0200] "POST /wp-login.php HTTP/1.1" 200 6603 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
www.fahrschule-mihm.de 107.161.177.66 [25/Aug/2020:22:02:01 +0200] "POST /xmlrpc.php HTTP/1.1" 200 4072 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-08-26 04:28:26
115.231.65.34 attackspam
Unauthorized connection attempt from IP address 115.231.65.34 on Port 445(SMB)
2020-08-26 04:26:30
222.186.180.147 attackspambots
2020-08-25T22:40:59.141753mail.broermann.family sshd[3687]: Failed password for root from 222.186.180.147 port 6600 ssh2
2020-08-25T22:41:01.710835mail.broermann.family sshd[3687]: Failed password for root from 222.186.180.147 port 6600 ssh2
2020-08-25T22:41:04.567056mail.broermann.family sshd[3687]: Failed password for root from 222.186.180.147 port 6600 ssh2
2020-08-25T22:41:04.567332mail.broermann.family sshd[3687]: error: maximum authentication attempts exceeded for root from 222.186.180.147 port 6600 ssh2 [preauth]
2020-08-25T22:41:04.567358mail.broermann.family sshd[3687]: Disconnecting: Too many authentication failures [preauth]
...
2020-08-26 04:47:36
222.186.15.115 attackbots
Aug 25 22:30:09 * sshd[21083]: Failed password for root from 222.186.15.115 port 49275 ssh2
2020-08-26 04:40:10

Recently Reported IPs

202.129.117.30 212.193.167.244 216.174.217.42 83.220.55.98
223.113.159.38 72.103.230.151 91.158.8.167 196.219.229.178
181.117.96.97 46.218.209.49 27.241.160.39 107.193.205.224
178.15.22.7 187.27.155.90 214.89.151.0 91.112.220.113
108.249.251.121 111.213.151.125 52.42.3.170 67.178.90.7