Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.132.166.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30942
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.132.166.122.		IN	A

;; AUTHORITY SECTION:
.			593	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122801 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 29 10:46:45 CST 2021
;; MSG SIZE  rcvd: 108
Host info
122.166.132.142.in-addr.arpa domain name pointer static.122.166.132.142.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.166.132.142.in-addr.arpa	name = static.122.166.132.142.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.35.211.22 attack
Listed on    abuseat.org plus zen-spamhaus   / proto=6  .  srcport=55049  .  dstport=1023  .     (3506)
2020-10-06 02:13:27
211.155.225.104 attackbots
Oct  5 15:43:22 h2829583 sshd[5240]: Failed password for root from 211.155.225.104 port 49953 ssh2
2020-10-06 02:12:15
167.71.112.14 attackspam
SSH login attempts.
2020-10-06 02:14:04
119.254.155.39 attackspam
SMTP:25. 2 failed access attempts. IP blocked.
2020-10-06 02:03:08
45.142.120.59 attack
Port scan denied
2020-10-06 02:19:56
198.27.67.87 attack
Trolling for resource vulnerabilities
2020-10-06 02:21:39
42.194.198.187 attack
(sshd) Failed SSH login from 42.194.198.187 (CN/China/-/-/-/[AS45090 Shenzhen Tencent Computer Systems Company Limited]): 10 in the last 3600 secs
2020-10-06 02:16:10
5.228.171.215 attackspambots
Icarus honeypot on github
2020-10-06 02:04:58
103.89.176.74 attackspam
2020-10-05T03:35:08.358283hostname sshd[101397]: Failed password for root from 103.89.176.74 port 47090 ssh2
...
2020-10-06 02:33:10
49.234.67.158 attackspam
fail2ban detected brute force on sshd
2020-10-06 02:15:17
138.75.138.149 attackbotsspam
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=55347  .  dstport=23 Telnet  .     (3507)
2020-10-06 02:08:01
202.90.199.208 attack
Oct  5 16:40:10 jane sshd[17684]: Failed password for root from 202.90.199.208 port 46002 ssh2
...
2020-10-06 02:26:03
162.243.128.129 attackspambots
 TCP (SYN) 162.243.128.129:42332 -> port 8983, len 44
2020-10-06 02:22:43
64.227.2.2 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-10-06 02:19:31
156.199.241.11 attackbots
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=55089  .  dstport=23 Telnet  .     (3503)
2020-10-06 02:27:19

Recently Reported IPs

57.72.86.155 62.98.149.70 117.86.129.178 31.250.0.204
222.87.114.127 248.140.27.102 236.101.169.122 81.48.243.10
35.186.188.237 182.251.156.250 183.147.127.106 254.71.229.107
128.206.124.92 164.104.32.118 29.111.213.60 89.182.156.24
5.228.216.116 62.183.206.162 233.11.223.249 39.53.143.99