Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.145.53.156
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59185
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.145.53.156.			IN	A

;; AUTHORITY SECTION:
.			461	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021401 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 15 12:03:01 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 156.53.145.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 156.53.145.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
116.113.99.171 attackspam
Unauthorized connection attempt detected from IP address 116.113.99.171 to port 5555 [J]
2020-01-29 21:03:42
182.140.233.162 attack
Unauthorized connection attempt detected from IP address 182.140.233.162 to port 1433 [T]
2020-01-29 21:38:38
218.91.100.7 attackspam
Unauthorized connection attempt detected from IP address 218.91.100.7 to port 6656 [T]
2020-01-29 21:37:47
120.76.123.100 attackspambots
Unauthorized connection attempt detected from IP address 120.76.123.100 to port 1433 [T]
2020-01-29 21:20:11
201.203.117.113 attackspambots
2019-10-24 04:50:55 1iNTDC-0002cq-Hm SMTP connection from \(\[201.203.117.113\]\) \[201.203.117.113\]:26048 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-10-24 04:51:09 1iNTDR-0002dQ-1r SMTP connection from \(\[201.203.117.113\]\) \[201.203.117.113\]:25800 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-10-24 04:51:23 1iNTDd-0002dc-O0 SMTP connection from \(\[201.203.117.113\]\) \[201.203.117.113\]:25917 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-29 21:43:17
36.26.139.154 attack
Unauthorized connection attempt detected from IP address 36.26.139.154 to port 6656 [T]
2020-01-29 21:33:14
111.60.233.22 attackspambots
Unauthorized connection attempt detected from IP address 111.60.233.22 to port 7044 [T]
2020-01-29 21:25:50
192.253.224.194 attack
Unauthorized connection attempt detected from IP address 192.253.224.194 to port 445 [T]
2020-01-29 21:38:08
115.238.230.102 attackbotsspam
Unauthorized connection attempt detected from IP address 115.238.230.102 to port 445 [T]
2020-01-29 21:22:01
106.6.233.215 attack
Unauthorized connection attempt detected from IP address 106.6.233.215 to port 6656 [T]
2020-01-29 21:07:42
42.113.68.89 attack
Unauthorized connection attempt detected from IP address 42.113.68.89 to port 23 [J]
2020-01-29 21:31:58
222.186.30.76 attackspam
Jan 29 14:34:07 lnxweb62 sshd[24256]: Failed password for root from 222.186.30.76 port 41520 ssh2
Jan 29 14:34:07 lnxweb62 sshd[24256]: Failed password for root from 222.186.30.76 port 41520 ssh2
Jan 29 14:34:09 lnxweb62 sshd[24256]: Failed password for root from 222.186.30.76 port 41520 ssh2
2020-01-29 21:36:12
36.34.56.25 attack
Unauthorized connection attempt detected from IP address 36.34.56.25 to port 23 [T]
2020-01-29 21:32:46
101.51.216.182 attackbots
unauthorized connection attempt
2020-01-29 21:27:10
183.165.11.185 attackspambots
Unauthorized connection attempt detected from IP address 183.165.11.185 to port 6656 [T]
2020-01-29 21:14:30

Recently Reported IPs

255.116.168.32 197.121.143.52 23.77.200.93 199.8.154.140
95.154.204.19 179.54.48.133 144.8.105.89 236.211.17.135
114.91.56.249 51.9.114.119 250.91.224.153 73.106.147.239
5.212.167.229 172.84.54.209 231.56.216.217 180.26.206.56
230.224.163.9 247.28.110.98 238.241.110.3 168.216.93.186