Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Winnipeg

Region: Manitoba

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.138.198.108
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23067
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.138.198.108.		IN	A

;; AUTHORITY SECTION:
.			366	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121902 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 20 04:29:59 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 108.198.138.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 108.198.138.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.61.50.25 attack
2019-08-11T14:19:05.284841  sshd[32728]: Invalid user cmveng from 182.61.50.25 port 59236
2019-08-11T14:19:05.297765  sshd[32728]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.50.25
2019-08-11T14:19:05.284841  sshd[32728]: Invalid user cmveng from 182.61.50.25 port 59236
2019-08-11T14:19:07.294832  sshd[32728]: Failed password for invalid user cmveng from 182.61.50.25 port 59236 ssh2
2019-08-11T14:24:08.066816  sshd[32759]: Invalid user lilycity from 182.61.50.25 port 44064
...
2019-08-12 01:24:48
218.161.23.152 attackspam
Aug 11 16:28:54 ubuntu-2gb-nbg1-dc3-1 sshd[10191]: Failed password for root from 218.161.23.152 port 40447 ssh2
Aug 11 16:29:00 ubuntu-2gb-nbg1-dc3-1 sshd[10191]: error: maximum authentication attempts exceeded for root from 218.161.23.152 port 40447 ssh2 [preauth]
...
2019-08-12 01:48:19
23.129.64.155 attackbotsspam
$f2bV_matches
2019-08-12 01:58:17
80.250.7.154 attack
Aug 11 09:30:01 h2753507 postfix/smtpd[29897]: connect from unknown[80.250.7.154]
Aug 11 09:30:01 h2753507 postfix/smtpd[29897]: warning: unknown[80.250.7.154]: SASL CRAM-MD5 authentication failed: authentication failure
Aug 11 09:30:01 h2753507 postfix/smtpd[29897]: warning: unknown[80.250.7.154]: SASL PLAIN authentication failed: authentication failure
Aug 11 09:30:01 h2753507 postfix/smtpd[29897]: warning: unknown[80.250.7.154]: SASL LOGIN authentication failed: authentication failure
Aug 11 09:30:01 h2753507 postfix/smtpd[29897]: disconnect from unknown[80.250.7.154] ehlo=1 auth=0/3 quhostname=1 commands=2/5


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=80.250.7.154
2019-08-12 02:05:48
188.165.242.200 attackbotsspam
2019-08-11T17:15:22.728096abusebot-8.cloudsearch.cf sshd\[25677\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3077451.ip-188-165-242.eu  user=root
2019-08-12 01:39:18
103.31.82.122 attackbots
Aug 11 09:35:09 localhost sshd\[3630\]: Invalid user gmalloy from 103.31.82.122 port 58817
Aug 11 09:35:09 localhost sshd\[3630\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.31.82.122
Aug 11 09:35:11 localhost sshd\[3630\]: Failed password for invalid user gmalloy from 103.31.82.122 port 58817 ssh2
...
2019-08-12 01:31:59
61.219.11.153 attack
08/11/2019-12:53:23.613509 61.219.11.153 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 63
2019-08-12 01:16:06
142.93.130.169 attack
Chat Spam
2019-08-12 02:07:57
87.69.216.115 attackspambots
Aug 11 12:07:36 mailman sshd[5594]: Invalid user oliver from 87.69.216.115
Aug 11 12:07:36 mailman sshd[5594]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.69.216.115 
Aug 11 12:07:37 mailman sshd[5594]: Failed password for invalid user oliver from 87.69.216.115 port 34741 ssh2
2019-08-12 01:28:06
80.99.218.149 attack
LGS,WP GET /wp-login.php
2019-08-12 01:43:37
175.147.18.204 attack
Telnetd brute force attack detected by fail2ban
2019-08-12 01:33:06
125.124.30.186 attack
SSH invalid-user multiple login attempts
2019-08-12 02:10:16
5.89.57.142 attackspam
Aug 11 17:49:52 mout sshd[21031]: Invalid user selma from 5.89.57.142 port 40394
2019-08-12 02:02:24
80.227.148.46 attackspambots
Aug 11 18:53:50 srv206 sshd[20780]: Invalid user mysql from 80.227.148.46
Aug 11 18:53:50 srv206 sshd[20780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.227.148.46
Aug 11 18:53:50 srv206 sshd[20780]: Invalid user mysql from 80.227.148.46
Aug 11 18:53:53 srv206 sshd[20780]: Failed password for invalid user mysql from 80.227.148.46 port 47002 ssh2
...
2019-08-12 01:23:28
91.207.175.179 attackspam
[portscan] Port scan
2019-08-12 01:52:13

Recently Reported IPs

86.237.210.28 100.143.51.159 23.129.64.222 106.215.4.23
166.172.165.62 151.37.148.176 31.11.158.236 191.121.26.112
208.191.20.242 80.223.134.59 91.172.48.81 5.227.50.201
101.51.217.191 102.250.104.194 82.244.16.212 84.142.180.21
90.195.16.220 203.206.204.85 218.166.43.52 49.39.17.26