Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.136.81.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43812
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.136.81.136.			IN	A

;; AUTHORITY SECTION:
.			216	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:19:17 CST 2022
;; MSG SIZE  rcvd: 107
Host info
136.81.136.142.in-addr.arpa domain name pointer www.twcsc.com.
136.81.136.142.in-addr.arpa domain name pointer twcnc.com.
136.81.136.142.in-addr.arpa domain name pointer twcdigitalphone.com.
136.81.136.142.in-addr.arpa domain name pointer timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa domain name pointer elpaquetazo.com.
136.81.136.142.in-addr.arpa domain name pointer www.timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa domain name pointer elpaq.com.
136.81.136.142.in-addr.arpa domain name pointer www.twcarolina.com.
136.81.136.142.in-addr.arpa domain name pointer twcarolina.com.
136.81.136.142.in-addr.arpa domain name pointer twcsc.com.
136.81.136.142.in-addr.arpa domain name pointer www.twcdigitalphone.com.
136.81.136.142.in-addr.arpa domain name pointer www.elpaquetazo.com.
136.81.136.142.in-addr.arpa domain name pointer www.twcnc.com.
136.81.136.142.in-addr.arpa domain name pointer www.elpaq.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.81.136.142.in-addr.arpa	name = www.twcsc.com.
136.81.136.142.in-addr.arpa	name = twcnc.com.
136.81.136.142.in-addr.arpa	name = twcdigitalphone.com.
136.81.136.142.in-addr.arpa	name = timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa	name = elpaquetazo.com.
136.81.136.142.in-addr.arpa	name = www.timewarnerpowerhouse.com.
136.81.136.142.in-addr.arpa	name = elpaq.com.
136.81.136.142.in-addr.arpa	name = www.twcarolina.com.
136.81.136.142.in-addr.arpa	name = twcarolina.com.
136.81.136.142.in-addr.arpa	name = twcsc.com.
136.81.136.142.in-addr.arpa	name = www.twcdigitalphone.com.
136.81.136.142.in-addr.arpa	name = www.elpaquetazo.com.
136.81.136.142.in-addr.arpa	name = www.twcnc.com.
136.81.136.142.in-addr.arpa	name = www.elpaq.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.207.159.104 attack
Automatic report - Web App Attack
2019-07-04 16:27:21
184.105.139.122 attackspambots
27017/tcp 873/tcp 5900/tcp...
[2019-05-05/07-03]39pkt,13pt.(tcp),2pt.(udp)
2019-07-04 16:46:46
110.45.145.178 attack
Jul  4 09:23:01 * sshd[25322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.45.145.178
Jul  4 09:23:03 * sshd[25322]: Failed password for invalid user test from 110.45.145.178 port 59540 ssh2
2019-07-04 16:45:58
103.85.60.155 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 09:57:27,659 INFO [shellcode_manager] (103.85.60.155) no match, writing hexdump (3faa320e0eab4d237f476b0ccffecc15 :2265607) - MS17010 (EternalBlue)
2019-07-04 16:59:52
75.134.8.29 attackspambots
2019-07-04T09:34:21.164629cavecanem sshd[8374]: Invalid user abc from 75.134.8.29 port 1706
2019-07-04T09:34:21.167209cavecanem sshd[8374]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.134.8.29
2019-07-04T09:34:21.164629cavecanem sshd[8374]: Invalid user abc from 75.134.8.29 port 1706
2019-07-04T09:34:22.985892cavecanem sshd[8374]: Failed password for invalid user abc from 75.134.8.29 port 1706 ssh2
2019-07-04T09:36:49.904262cavecanem sshd[9269]: Invalid user pokemon from 75.134.8.29 port 64598
2019-07-04T09:36:49.908758cavecanem sshd[9269]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=75.134.8.29
2019-07-04T09:36:49.904262cavecanem sshd[9269]: Invalid user pokemon from 75.134.8.29 port 64598
2019-07-04T09:36:52.379641cavecanem sshd[9269]: Failed password for invalid user pokemon from 75.134.8.29 port 64598 ssh2
2019-07-04T09:39:13.930746cavecanem sshd[9877]: Invalid user wai from 75.134.8.29 port 
...
2019-07-04 16:32:48
190.145.132.250 attackspam
proto=tcp  .  spt=55901  .  dpt=25  .     (listed on     Github Combined on 4 lists )     (420)
2019-07-04 16:20:39
202.51.189.122 attackspambots
proto=tcp  .  spt=55890  .  dpt=25  .     (listed on Blocklist de  Jul 03)     (424)
2019-07-04 16:11:13
77.247.181.162 attackspam
Jul  4 10:10:26 km20725 sshd\[26690\]: Failed password for root from 77.247.181.162 port 50288 ssh2Jul  4 10:10:29 km20725 sshd\[26690\]: Failed password for root from 77.247.181.162 port 50288 ssh2Jul  4 10:10:32 km20725 sshd\[26690\]: Failed password for root from 77.247.181.162 port 50288 ssh2Jul  4 10:10:35 km20725 sshd\[26690\]: Failed password for root from 77.247.181.162 port 50288 ssh2
...
2019-07-04 16:47:59
197.157.20.202 attack
19/7/4@03:37:11: FAIL: Alarm-Intrusion address from=197.157.20.202
19/7/4@03:37:11: FAIL: Alarm-Intrusion address from=197.157.20.202
...
2019-07-04 16:14:22
45.227.254.6 attack
RDP Bruteforce
2019-07-04 17:03:18
96.45.245.194 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-03 09:09:00,865 INFO [shellcode_manager] (96.45.245.194) no match, writing hexdump (7f38e7bc29256b45bc1170551c445208 :2064781) - MS17010 (EternalBlue)
2019-07-04 16:49:40
107.170.203.160 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-04 16:31:52
142.93.107.37 attackbotsspam
Automated report - ssh fail2ban:
Jul 4 09:46:13 authentication failure 
Jul 4 09:46:15 wrong password, user=justin, port=50548, ssh2
Jul 4 09:48:13 authentication failure
2019-07-04 16:18:57
218.69.91.84 attackspam
Jul  4 09:59:00 vps647732 sshd[24803]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.69.91.84
Jul  4 09:59:02 vps647732 sshd[24803]: Failed password for invalid user arkserver from 218.69.91.84 port 57965 ssh2
...
2019-07-04 16:10:11
14.248.80.91 attackbots
445/tcp 445/tcp 445/tcp...
[2019-05-28/07-04]5pkt,1pt.(tcp)
2019-07-04 16:17:08

Recently Reported IPs

142.137.248.90 142.139.24.123 142.136.81.135 142.139.25.42
142.146.96.11 142.147.105.19 142.147.109.8 142.147.99.156
142.154.237.15 142.147.97.90 142.154.121.88 142.154.111.71
142.154.62.208 142.156.90.42 142.154.74.173 142.164.252.13
142.154.97.230 142.165.148.140 142.165.148.57 142.165.95.198