Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.141.4.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50204
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.141.4.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:59:16 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 136.4.141.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.4.141.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.83.72.243 attackspam
bruteforce detected
2020-05-07 07:32:02
167.99.77.94 attack
2020-05-06T21:54:56.960135shield sshd\[11688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.77.94  user=root
2020-05-06T21:54:58.432203shield sshd\[11688\]: Failed password for root from 167.99.77.94 port 52062 ssh2
2020-05-06T21:57:28.312790shield sshd\[12313\]: Invalid user ramesh from 167.99.77.94 port 33642
2020-05-06T21:57:28.316463shield sshd\[12313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.77.94
2020-05-06T21:57:30.656455shield sshd\[12313\]: Failed password for invalid user ramesh from 167.99.77.94 port 33642 ssh2
2020-05-07 07:03:24
106.12.74.141 attackbotsspam
SSH Invalid Login
2020-05-07 07:21:20
188.57.66.51 attackbotsspam
1588796410 - 05/06/2020 22:20:10 Host: 188.57.66.51/188.57.66.51 Port: 445 TCP Blocked
2020-05-07 07:16:35
185.133.40.113 attackbotsspam
2020-05-06T23:23:45.963181abusebot-4.cloudsearch.cf sshd[29238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.133.40.113  user=root
2020-05-06T23:23:47.344912abusebot-4.cloudsearch.cf sshd[29238]: Failed password for root from 185.133.40.113 port 49118 ssh2
2020-05-06T23:24:14.460763abusebot-4.cloudsearch.cf sshd[29263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.133.40.113  user=root
2020-05-06T23:24:16.825641abusebot-4.cloudsearch.cf sshd[29263]: Failed password for root from 185.133.40.113 port 60098 ssh2
2020-05-06T23:24:42.551939abusebot-4.cloudsearch.cf sshd[29290]: Invalid user admin from 185.133.40.113 port 42930
2020-05-06T23:24:42.558102abusebot-4.cloudsearch.cf sshd[29290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.133.40.113
2020-05-06T23:24:42.551939abusebot-4.cloudsearch.cf sshd[29290]: Invalid user admin from 185.133.40.113 por
...
2020-05-07 07:26:11
181.49.254.230 attackspam
4x Failed Password
2020-05-07 07:38:32
86.140.78.120 attackbots
firewall-block, port(s): 23/tcp
2020-05-07 07:04:53
165.227.95.232 attack
SSH Invalid Login
2020-05-07 07:17:09
113.119.164.87 attackspam
May  6 16:13:29 r.ca sshd[5210]: Failed password for invalid user lishan from 113.119.164.87 port 29373 ssh2
2020-05-07 07:21:04
119.28.221.132 attackspam
May  6 22:20:06 vps639187 sshd\[4935\]: Invalid user frederic from 119.28.221.132 port 37170
May  6 22:20:06 vps639187 sshd\[4935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.221.132
May  6 22:20:09 vps639187 sshd\[4935\]: Failed password for invalid user frederic from 119.28.221.132 port 37170 ssh2
...
2020-05-07 07:19:55
80.82.70.194 attackbotsspam
Multiport scan : 15 ports scanned 9085 9149 9194 9263 9471 9501 9539 9544 9792 9818 9824 9926 9948 9965 9997
2020-05-07 07:12:10
51.68.190.223 attackspam
May  6 20:20:20 ws26vmsma01 sshd[135489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.190.223
May  6 20:20:22 ws26vmsma01 sshd[135489]: Failed password for invalid user deployment from 51.68.190.223 port 58640 ssh2
...
2020-05-07 07:13:01
113.141.70.204 attack
[2020-05-06 18:39:19] NOTICE[1157] chan_sip.c: Registration from '"567" ' failed for '113.141.70.204:5141' - Wrong password
[2020-05-06 18:39:19] SECURITY[1173] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-05-06T18:39:19.598-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="567",SessionID="0x7f5f10197838",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/113.141.70.204/5141",Challenge="307ea7a0",ReceivedChallenge="307ea7a0",ReceivedHash="5d5866a09ca70c60b775e4179e61b980"
[2020-05-06 18:39:19] NOTICE[1157] chan_sip.c: Registration from '"567" ' failed for '113.141.70.204:5141' - Wrong password
[2020-05-06 18:39:19] SECURITY[1173] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-05-06T18:39:19.923-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="567",SessionID="0x7f5f100266a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/113.1
...
2020-05-07 07:01:20
91.118.56.58 attackspam
Chat Spam
2020-05-07 07:37:32
51.15.118.114 attackbotsspam
May  6 22:12:53 server sshd[38126]: Failed password for invalid user ardi from 51.15.118.114 port 40324 ssh2
May  6 22:16:31 server sshd[41108]: Failed password for root from 51.15.118.114 port 49544 ssh2
May  6 22:20:02 server sshd[43718]: Failed password for invalid user zoe from 51.15.118.114 port 58774 ssh2
2020-05-07 07:27:37

Recently Reported IPs

202.117.184.120 181.136.38.149 240.77.55.3 239.63.10.127
12.32.20.11 225.202.180.148 204.79.73.88 42.221.222.243
166.57.57.126 225.53.227.243 170.157.141.69 14.35.173.117
70.142.152.161 127.122.172.113 172.25.107.38 176.8.182.243
207.14.142.44 184.60.246.95 85.179.21.120 23.44.204.8