Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Oshawa

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.144.22.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10169
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.144.22.57.			IN	A

;; AUTHORITY SECTION:
.			384	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030201 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 03 01:42:35 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 57.22.144.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.22.144.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.32.111.52 attackbotsspam
Oct  2 20:33:36 host2 sshd[683977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.111.52  user=root
Oct  2 20:33:38 host2 sshd[683977]: Failed password for root from 213.32.111.52 port 36152 ssh2
Oct  2 20:39:53 host2 sshd[684732]: Invalid user vbox from 213.32.111.52 port 43628
Oct  2 20:39:53 host2 sshd[684732]: Invalid user vbox from 213.32.111.52 port 43628
...
2020-10-03 03:22:26
192.241.232.168 attackbots
TCP port : 7473; UDP port : 623
2020-10-03 03:28:24
31.166.147.100 attack
Oct  1 22:41:06 ourumov-web sshd\[30551\]: Invalid user user from 31.166.147.100 port 60712
Oct  1 22:41:07 ourumov-web sshd\[30551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.166.147.100
Oct  1 22:41:09 ourumov-web sshd\[30551\]: Failed password for invalid user user from 31.166.147.100 port 60712 ssh2
...
2020-10-03 03:02:10
123.127.244.100 attack
Unauthorized SSH login attempts
2020-10-03 03:07:11
37.46.133.44 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2020-10-03 03:21:44
139.180.152.207 attack
2020-10-02T20:45:53.403903hostname sshd[34834]: Failed password for root from 139.180.152.207 port 58464 ssh2
...
2020-10-03 03:18:39
193.106.175.55 attackspambots
2020-10-02 04:05:57.692272-0500  localhost smtpd[17887]: NOQUEUE: reject: RCPT from unknown[193.106.175.55]: 554 5.7.1 Service unavailable; Client host [193.106.175.55] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBL495727; from= to= proto=ESMTP helo=
2020-10-03 02:58:20
142.93.193.63 attack
Trolling for resource vulnerabilities
2020-10-03 03:28:53
112.85.42.187 attackbots
Oct  2 20:33:56 ns381471 sshd[23791]: Failed password for root from 112.85.42.187 port 15987 ssh2
Oct  2 20:33:58 ns381471 sshd[23791]: Failed password for root from 112.85.42.187 port 15987 ssh2
2020-10-03 02:59:54
110.49.71.246 attackbots
Oct  3 00:29:20 lunarastro sshd[17741]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.49.71.246 
Oct  3 00:29:22 lunarastro sshd[17741]: Failed password for invalid user local from 110.49.71.246 port 50444 ssh2
2020-10-03 03:31:40
222.186.30.76 attack
[SID2] Fail2ban detected 5 failed SSH login attempts within 30 minutes. This report was submitted automatically.
2020-10-03 03:02:57
54.177.211.200 attackspambots
port scan and connect, tcp 23 (telnet)
2020-10-03 03:03:21
157.245.108.35 attack
Invalid user king from 157.245.108.35 port 33240
2020-10-03 03:33:59
122.51.64.115 attack
122.51.64.115 (CN/China/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  2 14:20:03 jbs1 sshd[7199]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.147.108  user=root
Oct  2 14:20:05 jbs1 sshd[7199]: Failed password for root from 49.233.147.108 port 55156 ssh2
Oct  2 14:21:01 jbs1 sshd[7880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.64.115  user=root
Oct  2 14:17:37 jbs1 sshd[5641]: Failed password for root from 138.97.23.190 port 39958 ssh2
Oct  2 14:20:23 jbs1 sshd[7472]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.175.171.169  user=root
Oct  2 14:20:25 jbs1 sshd[7472]: Failed password for root from 85.175.171.169 port 41818 ssh2

IP Addresses Blocked:

49.233.147.108 (CN/China/-)
2020-10-03 03:10:49
27.128.165.131 attack
Oct  2 15:10:49 cho sshd[4068449]: Invalid user composer from 27.128.165.131 port 48054
Oct  2 15:10:49 cho sshd[4068449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.165.131 
Oct  2 15:10:49 cho sshd[4068449]: Invalid user composer from 27.128.165.131 port 48054
Oct  2 15:10:51 cho sshd[4068449]: Failed password for invalid user composer from 27.128.165.131 port 48054 ssh2
Oct  2 15:15:30 cho sshd[4068607]: Invalid user test from 27.128.165.131 port 53928
...
2020-10-03 03:14:27

Recently Reported IPs

35.188.57.149 66.198.103.190 188.10.151.29 107.77.233.110
171.165.62.223 49.166.193.132 173.213.80.162 157.107.187.29
84.32.234.227 169.59.138.4 43.130.79.76 20.145.244.250
216.100.193.51 82.228.16.171 114.104.159.73 172.210.211.10
173.213.80.160 209.3.34.119 42.64.109.136 185.23.193.118