Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.145.121.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53488
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.145.121.209.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012401 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 25 03:18:27 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 209.121.145.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 209.121.145.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.38.25.114 attackbotsspam
unauthorized connection attempt
2020-01-15 18:27:12
222.186.30.12 attackbotsspam
01/15/2020-05:59:09.576849 222.186.30.12 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-15 19:01:15
58.43.242.196 attackspambots
Unauthorized connection attempt from IP address 58.43.242.196 on Port 445(SMB)
2020-01-15 18:51:43
92.76.213.127 attackbotsspam
Jan 14 07:30:50 h1637304 sshd[31749]: Failed password for invalid user sang from 92.76.213.127 port 53028 ssh2
Jan 14 07:30:50 h1637304 sshd[31749]: Received disconnect from 92.76.213.127: 11: Bye Bye [preauth]
Jan 14 07:39:36 h1637304 sshd[4104]: Failed password for r.r from 92.76.213.127 port 45768 ssh2
Jan 14 07:39:36 h1637304 sshd[4104]: Received disconnect from 92.76.213.127: 11: Bye Bye [preauth]
Jan 14 07:44:02 h1637304 sshd[8733]: Failed password for invalid user vyatta from 92.76.213.127 port 41052 ssh2
Jan 14 07:44:02 h1637304 sshd[8733]: Received disconnect from 92.76.213.127: 11: Bye Bye [preauth]
Jan 14 07:48:12 h1637304 sshd[13406]: Failed password for invalid user httpfs from 92.76.213.127 port 36338 ssh2
Jan 14 07:48:13 h1637304 sshd[13406]: Received disconnect from 92.76.213.127: 11: Bye Bye [preauth]
Jan 14 07:52:09 h1637304 sshd[18468]: Failed password for invalid user zack from 92.76.213.127 port 59856 ssh2
Jan 14 07:52:09 h1637304 sshd[18468]: Recei........
-------------------------------
2020-01-15 19:03:28
14.248.80.65 attack
1579063634 - 01/15/2020 05:47:14 Host: 14.248.80.65/14.248.80.65 Port: 445 TCP Blocked
2020-01-15 19:00:41
152.32.169.165 attackbots
Invalid user git from 152.32.169.165 port 52702
2020-01-15 18:45:45
185.152.12.49 attack
email spam
2020-01-15 18:27:47
172.81.226.22 attackbots
Jan 15 06:33:37 localhost sshd\[16610\]: Invalid user ok from 172.81.226.22
Jan 15 06:33:37 localhost sshd\[16610\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.226.22
Jan 15 06:33:39 localhost sshd\[16610\]: Failed password for invalid user ok from 172.81.226.22 port 53186 ssh2
Jan 15 06:34:34 localhost sshd\[16675\]: Invalid user yu from 172.81.226.22
Jan 15 06:34:34 localhost sshd\[16675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.81.226.22
...
2020-01-15 18:43:47
218.208.182.110 attackbotsspam
Unauthorized connection attempt detected from IP address 218.208.182.110 to port 8000 [J]
2020-01-15 18:50:08
114.143.247.10 attackspam
Unauthorized connection attempt detected from IP address 114.143.247.10 to port 2220 [J]
2020-01-15 18:30:00
185.66.57.103 attackbotsspam
Received: from 185.66.57.103  (HELO 182.22.12.113) (185.66.57.103)
Return-Path: 
Message-ID: 
From: "ID:stevedoreBS/CS全89チャネル有料放送が無料で視聴出来る話題のカードが価格破壊!" 
Reply-To: "ID:trailheadスターチャンネルやWOWOW対策突破!視聴可能!感謝セール大開催!" 
Subject: ID:emmett 現在WOWOW・スカパー・スターチャンネル全てのch対策突破!現在も完璧視聴可能
Date: Sun, 12 Jan 2020 20:48:22 +0100
X-Mailer: Microsoft Outlook Express 6.00.2462.0000
2020-01-15 18:33:26
218.92.0.178 attackbots
Jan 15 11:30:36 MK-Soft-Root2 sshd[841]: Failed password for root from 218.92.0.178 port 33347 ssh2
Jan 15 11:30:40 MK-Soft-Root2 sshd[841]: Failed password for root from 218.92.0.178 port 33347 ssh2
...
2020-01-15 18:37:12
190.72.18.243 attackbots
1579068001 - 01/15/2020 07:00:01 Host: 190.72.18.243/190.72.18.243 Port: 445 TCP Blocked
2020-01-15 18:50:29
36.72.214.12 attackbots
Unauthorized connection attempt from IP address 36.72.214.12 on Port 445(SMB)
2020-01-15 18:44:13
118.122.124.78 attack
$f2bV_matches
2020-01-15 19:04:36

Recently Reported IPs

35.0.120.238 80.211.124.210 144.145.48.152 51.206.27.26
187.187.36.121 224.99.132.107 160.82.79.73 5.210.64.248
190.225.79.4 89.23.198.156 127.187.184.73 126.78.254.214
222.97.12.103 219.190.3.28 231.39.86.191 49.39.213.6
234.131.92.152 124.42.31.99 46.1.78.199 153.203.54.219