Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.157.201.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.157.201.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:34:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 68.201.157.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 68.201.157.142.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
14.2.179.211 attackspam
Invalid user tf from 14.2.179.211 port 54165
2019-08-23 14:57:33
157.230.214.150 attackbots
Aug 23 09:40:54 lnxded63 sshd[27804]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.214.150
2019-08-23 15:51:40
89.31.148.179 attack
Invalid user clement from 89.31.148.179 port 48287
2019-08-23 15:33:21
132.232.104.106 attackbots
Invalid user shootmania from 132.232.104.106 port 34720
2019-08-23 15:55:09
159.65.63.39 attackspambots
Invalid user localhost from 159.65.63.39 port 52346
2019-08-23 15:50:49
35.202.27.205 attackspambots
Invalid user info1 from 35.202.27.205 port 55404
2019-08-23 15:41:37
116.196.83.143 attack
Bruteforce on SSH Honeypot
2019-08-23 15:59:32
122.114.79.98 attackbotsspam
Invalid user weblogic from 122.114.79.98 port 42838
2019-08-23 15:56:52
202.70.80.27 attackspam
Invalid user newsletter from 202.70.80.27 port 40606
2019-08-23 15:46:09
124.204.45.66 attackbotsspam
Aug 23 09:46:37 vps691689 sshd[12426]: Failed password for root from 124.204.45.66 port 56066 ssh2
Aug 23 09:51:30 vps691689 sshd[12517]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.204.45.66
...
2019-08-23 15:56:15
118.25.12.59 attack
Invalid user 111 from 118.25.12.59 port 46454
2019-08-23 15:58:18
134.209.158.32 attackbots
Invalid user fake from 134.209.158.32 port 54760
2019-08-23 15:24:29
218.200.46.3 attackbots
Invalid user timo from 218.200.46.3 port 43982
2019-08-23 15:43:07
111.19.163.174 attack
Invalid user qomo from 111.19.163.174 port 57646
2019-08-23 16:00:51
188.20.52.25 attackspam
Invalid user notebook from 188.20.52.25 port 47548
2019-08-23 15:07:19

Recently Reported IPs

71.227.211.5 41.212.39.111 156.210.40.35 235.219.195.183
96.158.77.153 61.40.103.30 185.189.175.209 45.192.116.244
17.55.161.70 223.23.46.37 101.88.24.39 163.13.218.45
44.47.130.17 24.246.190.140 39.55.232.83 161.19.227.237
95.167.14.146 97.150.15.239 114.13.50.230 202.67.111.3