Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: St. John's

Region: Newfoundland and Labrador

Country: Canada

Internet Service Provider: Bell

Hostname: unknown

Organization: Bell Canada

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.134.202.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22185
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.134.202.194.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052600 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun May 26 22:18:25 CST 2019
;; MSG SIZE  rcvd: 119

Host info
194.202.134.142.in-addr.arpa domain name pointer stjhnf0157w-142-134-202-194.dhcp-dynamic.fibreop.nl.bellaliant.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
194.202.134.142.in-addr.arpa	name = stjhnf0157w-142-134-202-194.dhcp-dynamic.fibreop.nl.bellaliant.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
37.183.12.191 attack
port scan and connect, tcp 23 (telnet)
2019-08-12 09:13:49
113.21.67.151 attackspambots
445/tcp
[2019-08-11]1pkt
2019-08-12 09:37:57
51.254.131.137 attack
2019-08-12T00:42:15.013768abusebot-7.cloudsearch.cf sshd\[25386\]: Invalid user blueeyes from 51.254.131.137 port 46640
2019-08-12 09:28:20
198.71.240.11 attack
fail2ban honeypot
2019-08-12 09:21:34
47.91.86.129 attack
Unauthorised access (Aug 11) SRC=47.91.86.129 LEN=40 TTL=52 ID=61079 TCP DPT=8080 WINDOW=39846 SYN
2019-08-12 09:23:31
43.251.170.145 attack
fail2ban honeypot
2019-08-12 09:33:12
222.186.52.155 attack
2019-08-11 UTC: 2x - (2x)
2019-08-12 09:00:58
148.70.113.127 attack
Aug 11 23:32:48 MK-Soft-VM7 sshd\[20294\]: Invalid user scott from 148.70.113.127 port 41632
Aug 11 23:32:48 MK-Soft-VM7 sshd\[20294\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.113.127
Aug 11 23:32:49 MK-Soft-VM7 sshd\[20294\]: Failed password for invalid user scott from 148.70.113.127 port 41632 ssh2
...
2019-08-12 09:02:25
197.46.211.229 attack
23/tcp
[2019-08-11]1pkt
2019-08-12 09:22:05
179.187.126.161 attackspambots
Honeypot attack, port: 23, PTR: 179.187.126.161.dynamic.adsl.gvt.net.br.
2019-08-12 09:41:17
69.226.244.247 attack
attack my web
2019-08-12 08:55:14
68.183.16.188 attackbotsspam
Fail2Ban Ban Triggered
2019-08-12 09:37:29
219.92.29.250 attackspam
Brute forcing RDP port 3389
2019-08-12 09:09:39
185.101.156.127 attackbotsspam
Honeypot attack, port: 445, PTR: 30399.hostserv.eu.
2019-08-12 09:21:06
49.88.112.90 attack
Aug 12 02:48:30 ubuntu-2gb-nbg1-dc3-1 sshd[19953]: Failed password for root from 49.88.112.90 port 60118 ssh2
Aug 12 02:48:32 ubuntu-2gb-nbg1-dc3-1 sshd[19953]: Failed password for root from 49.88.112.90 port 60118 ssh2
...
2019-08-12 09:09:05

Recently Reported IPs

180.176.89.123 117.218.220.40 125.199.180.173 125.8.154.27
107.173.191.83 193.159.252.96 208.4.46.41 62.35.127.121
106.111.118.29 198.204.85.208 15.125.252.113 187.230.62.185
111.121.228.112 113.174.169.156 151.47.24.133 91.68.104.58
44.110.215.95 1.100.40.131 220.128.43.167 148.48.1.100