Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.149.216.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.149.216.168.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 18:02:48 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 168.216.149.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 168.216.149.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.36.224.8 attack
fell into ViewStateTrap:nairobi
2019-06-25 18:17:13
94.97.120.53 attackbotsspam
Unauthorized connection attempt from IP address 94.97.120.53 on Port 445(SMB)
2019-06-25 18:13:33
77.243.126.211 attackbots
[portscan] Port scan
2019-06-25 19:04:04
31.46.143.244 attackspambots
Jun 25 10:55:21 v22018076622670303 sshd\[31521\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.46.143.244  user=root
Jun 25 10:55:22 v22018076622670303 sshd\[31521\]: Failed password for root from 31.46.143.244 port 60374 ssh2
Jun 25 11:03:12 v22018076622670303 sshd\[31536\]: Invalid user siverko from 31.46.143.244 port 49980
Jun 25 11:03:12 v22018076622670303 sshd\[31536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.46.143.244
...
2019-06-25 18:31:39
71.6.143.94 attackspam
25.06.2019 08:15:27 Recursive DNS scan
2019-06-25 18:45:48
142.93.187.61 attackspam
Jun 25 08:54:57 XXX sshd[9055]: Invalid user msf_user from 142.93.187.61 port 53516
2019-06-25 18:32:39
138.122.39.122 attackspam
failed_logins
2019-06-25 18:15:21
121.8.142.250 attackbotsspam
2019-06-25T08:58:50.764573scmdmz1 sshd\[15974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.8.142.250  user=admin
2019-06-25T08:58:52.096892scmdmz1 sshd\[15974\]: Failed password for admin from 121.8.142.250 port 59956 ssh2
2019-06-25T09:00:37.999423scmdmz1 sshd\[16005\]: Invalid user cms from 121.8.142.250 port 48078
...
2019-06-25 18:22:10
216.243.51.166 attackspambots
Unauthorized access on Port 22 [ssh]
2019-06-25 18:22:26
221.229.219.188 attack
SSH Bruteforce
2019-06-25 18:46:06
18.224.186.171 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2019-06-25 18:40:57
150.95.129.150 attackbots
2019-06-25T10:37:14.049454abusebot-5.cloudsearch.cf sshd\[11768\]: Invalid user hyx from 150.95.129.150 port 49136
2019-06-25 18:47:11
180.210.130.216 attack
firewall-block, port(s): 23/tcp
2019-06-25 18:11:33
37.114.139.147 attack
Jun 25 06:58:24 XXX sshd[18212]: Invalid user admin from 37.114.139.147 port 51156
2019-06-25 18:28:57
206.161.232.12 attack
Port scan: Attack repeated for 24 hours
2019-06-25 18:54:32

Recently Reported IPs

200.137.51.13 41.18.73.248 223.158.132.160 34.255.213.68
7.44.64.242 46.145.52.60 242.220.234.26 23.47.181.249
210.190.74.45 98.24.151.122 87.220.207.64 180.229.166.243
205.7.220.126 222.11.4.212 25.255.201.82 160.176.121.21
83.37.37.34 4.244.76.160 216.37.180.2 199.226.90.132