Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.157.44.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6113
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.157.44.135.			IN	A

;; AUTHORITY SECTION:
.			123	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020101 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 02 08:51:24 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 135.44.157.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 142.157.44.135.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
24.144.30.143 attackspambots
SpamScore above: 10.0
2020-03-26 04:13:12
102.140.212.225 attackspam
Unauthorized connection attempt from IP address 102.140.212.225 on Port 445(SMB)
2020-03-26 04:00:05
142.93.53.214 attackbots
Mar 25 17:20:15 vps sshd[7852]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.53.214 
Mar 25 17:20:17 vps sshd[7852]: Failed password for invalid user notepad from 142.93.53.214 port 48570 ssh2
Mar 25 17:23:26 vps sshd[7993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.53.214 
...
2020-03-26 04:14:58
14.160.85.230 attackspambots
Unauthorized connection attempt from IP address 14.160.85.230 on Port 445(SMB)
2020-03-26 04:04:09
137.119.19.230 attackbotsspam
Automatic report - Port Scan Attack
2020-03-26 03:44:52
106.12.47.171 attack
(sshd) Failed SSH login from 106.12.47.171 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 25 20:20:42 ubnt-55d23 sshd[18601]: Invalid user teste from 106.12.47.171 port 44848
Mar 25 20:20:44 ubnt-55d23 sshd[18601]: Failed password for invalid user teste from 106.12.47.171 port 44848 ssh2
2020-03-26 04:15:43
132.232.241.187 attackbotsspam
2020-03-25T18:44:14.601070abusebot-4.cloudsearch.cf sshd[12098]: Invalid user xi-wang from 132.232.241.187 port 41424
2020-03-25T18:44:14.609335abusebot-4.cloudsearch.cf sshd[12098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.241.187
2020-03-25T18:44:14.601070abusebot-4.cloudsearch.cf sshd[12098]: Invalid user xi-wang from 132.232.241.187 port 41424
2020-03-25T18:44:16.587955abusebot-4.cloudsearch.cf sshd[12098]: Failed password for invalid user xi-wang from 132.232.241.187 port 41424 ssh2
2020-03-25T18:48:41.076567abusebot-4.cloudsearch.cf sshd[12326]: Invalid user he from 132.232.241.187 port 38994
2020-03-25T18:48:41.083337abusebot-4.cloudsearch.cf sshd[12326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.241.187
2020-03-25T18:48:41.076567abusebot-4.cloudsearch.cf sshd[12326]: Invalid user he from 132.232.241.187 port 38994
2020-03-25T18:48:43.051631abusebot-4.cloudsearch.cf sshd[
...
2020-03-26 04:19:03
101.231.146.34 attackspambots
DATE:2020-03-25 19:44:41, IP:101.231.146.34, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-03-26 04:07:17
45.124.19.82 attackbotsspam
Unauthorized connection attempt detected from IP address 45.124.19.82 to port 1433
2020-03-26 04:01:06
191.162.7.47 attackspam
Attempt to attack host OS, exploiting network vulnerabilities, on 25-03-2020 12:45:16.
2020-03-26 03:52:22
61.5.83.9 attackbotsspam
Invalid user a from 61.5.83.9 port 56700
2020-03-26 03:55:59
202.29.80.133 attack
-
2020-03-26 03:42:49
190.181.60.2 attackspam
web-1 [ssh] SSH Attack
2020-03-26 04:14:28
102.134.164.150 attackbotsspam
2020-03-25T17:59:27.608187whonock.onlinehub.pt sshd[30922]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.164.150  user=nobody
2020-03-25T17:59:30.043451whonock.onlinehub.pt sshd[30922]: Failed password for nobody from 102.134.164.150 port 55260 ssh2
2020-03-25T18:10:24.123043whonock.onlinehub.pt sshd[2701]: Invalid user american from 102.134.164.150 port 48964
2020-03-25T18:10:24.126012whonock.onlinehub.pt sshd[2701]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=102.134.164.150
2020-03-25T18:10:24.123043whonock.onlinehub.pt sshd[2701]: Invalid user american from 102.134.164.150 port 48964
2020-03-25T18:10:26.418770whonock.onlinehub.pt sshd[2701]: Failed password for invalid user american from 102.134.164.150 port 48964 ssh2
2020-03-25T18:16:38.774546whonock.onlinehub.pt sshd[5105]: Invalid user celena from 102.134.164.150 port 34166
2020-03-25T18:16:38.777788whonock.onlinehub.pt sshd[5105]: pa
...
2020-03-26 03:40:30
62.28.223.119 attack
TCP Port: 25      invalid blocked  abuseat-org also barracuda and zen-spamhaus           (266)
2020-03-26 04:17:51

Recently Reported IPs

22.189.235.65 230.254.214.72 134.209.84.32 190.34.147.117
192.36.241.161 212.191.200.163 100.102.206.163 28.42.170.93
101.251.127.82 191.109.229.243 168.60.208.230 50.17.236.230
82.5.57.17 109.222.133.210 51.149.231.35 85.193.118.112
3.11.25.201 47.175.111.122 200.15.161.101 27.49.23.161