Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.159.100.51
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26888
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.159.100.51.			IN	A

;; AUTHORITY SECTION:
.			280	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 05:04:32 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 51.100.159.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 51.100.159.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.53.29.139 attackspambots
Oct 25 07:20:41 jonas sshd[21628]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.29.139  user=r.r
Oct 25 07:20:43 jonas sshd[21628]: Failed password for r.r from 106.53.29.139 port 58574 ssh2
Oct 25 07:20:44 jonas sshd[21628]: Received disconnect from 106.53.29.139 port 58574:11: Bye Bye [preauth]
Oct 25 07:20:44 jonas sshd[21628]: Disconnected from 106.53.29.139 port 58574 [preauth]
Oct 25 07:41:36 jonas sshd[22973]: Invalid user admin from 106.53.29.139
Oct 25 07:41:36 jonas sshd[22973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.29.139
Oct 25 07:41:38 jonas sshd[22973]: Failed password for invalid user admin from 106.53.29.139 port 39800 ssh2
Oct 25 07:41:38 jonas sshd[22973]: Received disconnect from 106.53.29.139 port 39800:11: Bye Bye [preauth]
Oct 25 07:41:38 jonas sshd[22973]: Disconnected from 106.53.29.139 port 39800 [preauth]
Oct 25 07:45:52 jonas sshd[23197]:........
-------------------------------
2019-10-26 00:00:15
85.93.20.92 attackspam
191025 10:00:34 \[Warning\] Access denied for user 'admin'@'85.93.20.92' \(using password: YES\)
191025 11:09:46 \[Warning\] Access denied for user 'BANKRUPTCY'@'85.93.20.92' \(using password: YES\)
191025 11:20:39 \[Warning\] Access denied for user 'BANKRUPTCY'@'85.93.20.92' \(using password: YES\)
...
2019-10-26 00:00:43
45.227.253.139 attackbots
Oct 25 17:31:45 relay postfix/smtpd\[2461\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 25 17:33:00 relay postfix/smtpd\[2461\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 25 17:33:07 relay postfix/smtpd\[3022\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 25 17:34:03 relay postfix/smtpd\[3021\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 25 17:34:10 relay postfix/smtpd\[2303\]: warning: unknown\[45.227.253.139\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-25 23:41:42
167.249.226.208 attack
1,27-00/00 [bc00/m01] concatform PostRequest-Spammer scoring: stockholm
2019-10-26 00:07:53
80.211.79.117 attackspam
Oct 25 17:42:15 MK-Soft-Root2 sshd[7236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.79.117 
Oct 25 17:42:17 MK-Soft-Root2 sshd[7236]: Failed password for invalid user dietpi from 80.211.79.117 port 40226 ssh2
...
2019-10-25 23:54:06
112.21.191.253 attackspam
Oct 25 10:35:42 django sshd[77234]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.253  user=r.r
Oct 25 10:35:43 django sshd[77234]: Failed password for r.r from 112.21.191.253 port 59902 ssh2
Oct 25 10:35:44 django sshd[77235]: Received disconnect from 112.21.191.253: 11: Bye Bye
Oct 25 10:59:33 django sshd[79002]: Invalid user tecnici from 112.21.191.253
Oct 25 10:59:33 django sshd[79002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.253 
Oct 25 10:59:35 django sshd[79002]: Failed password for invalid user tecnici from 112.21.191.253 port 56942 ssh2
Oct 25 10:59:36 django sshd[79003]: Received disconnect from 112.21.191.253: 11: Bye Bye
Oct 25 11:04:50 django sshd[79470]: Invalid user hm from 112.21.191.253
Oct 25 11:04:50 django sshd[79470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.21.191.253 


........
-----------------------------------------------
2019-10-26 00:08:53
188.226.234.131 attackbotsspam
Oct 25 15:08:53 icinga sshd[26652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.226.234.131
Oct 25 15:08:56 icinga sshd[26652]: Failed password for invalid user 123456 from 188.226.234.131 port 46272 ssh2
...
2019-10-25 23:44:51
197.114.64.94 attackspambots
Oct 25 14:01:13 mxgate1 postfix/postscreen[20152]: CONNECT from [197.114.64.94]:40457 to [176.31.12.44]:25
Oct 25 14:01:13 mxgate1 postfix/dnsblog[20677]: addr 197.114.64.94 listed by domain zen.spamhaus.org as 127.0.0.11
Oct 25 14:01:19 mxgate1 postfix/postscreen[20152]: DNSBL rank 2 for [197.114.64.94]:40457
Oct x@x
Oct 25 14:01:19 mxgate1 postfix/postscreen[20152]: HANGUP after 0.86 from [197.114.64.94]:40457 in tests after SMTP handshake
Oct 25 14:01:19 mxgate1 postfix/postscreen[20152]: DISCONNECT [197.114.64.94]:40457


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=197.114.64.94
2019-10-26 00:14:37
185.173.35.33 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 502 proto: TCP cat: Misc Attack
2019-10-26 00:07:35
49.84.195.85 attackbots
Oct 25 08:01:03 esmtp postfix/smtpd[30772]: lost connection after AUTH from unknown[49.84.195.85]
Oct 25 08:01:04 esmtp postfix/smtpd[30766]: lost connection after AUTH from unknown[49.84.195.85]
Oct 25 08:01:09 esmtp postfix/smtpd[30772]: lost connection after AUTH from unknown[49.84.195.85]
Oct 25 08:01:09 esmtp postfix/smtpd[30766]: lost connection after AUTH from unknown[49.84.195.85]
Oct 25 08:01:10 esmtp postfix/smtpd[30772]: lost connection after AUTH from unknown[49.84.195.85]

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.84.195.85
2019-10-26 00:17:58
176.107.131.128 attack
Oct 24 21:41:56 server sshd\[18813\]: Failed password for invalid user is from 176.107.131.128 port 50734 ssh2
Oct 25 15:50:52 server sshd\[6384\]: Invalid user openerp from 176.107.131.128
Oct 25 15:50:52 server sshd\[6384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.107.131.128 
Oct 25 15:50:55 server sshd\[6384\]: Failed password for invalid user openerp from 176.107.131.128 port 41818 ssh2
Oct 25 19:17:46 server sshd\[26971\]: Invalid user guest from 176.107.131.128
Oct 25 19:17:46 server sshd\[26971\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.107.131.128 
...
2019-10-26 00:22:57
124.152.76.213 attackbots
2019-10-25T12:06:16.468935homeassistant sshd[24523]: Invalid user user from 124.152.76.213 port 31008
2019-10-25T12:06:16.475882homeassistant sshd[24523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.152.76.213
...
2019-10-25 23:41:12
182.61.176.105 attackspam
Automatic report - Banned IP Access
2019-10-26 00:09:39
149.56.142.220 attack
Oct 25 12:47:58 firewall sshd[18725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.142.220
Oct 25 12:47:58 firewall sshd[18725]: Invalid user monit from 149.56.142.220
Oct 25 12:48:00 firewall sshd[18725]: Failed password for invalid user monit from 149.56.142.220 port 34202 ssh2
...
2019-10-26 00:21:16
183.60.143.57 attack
Unauthorised access (Oct 25) SRC=183.60.143.57 LEN=40 TOS=0x10 PREC=0x40 TTL=239 ID=56557 TCP DPT=1433 WINDOW=1024 SYN
2019-10-26 00:11:05

Recently Reported IPs

72.78.69.74 39.33.82.231 128.8.228.77 123.104.72.61
135.69.49.126 255.85.179.164 26.208.46.101 157.239.85.211
143.117.40.39 115.243.204.50 184.122.138.3 111.53.242.87
70.238.34.74 101.39.250.187 134.130.24.45 21.248.127.65
102.3.82.225 70.67.50.140 224.115.74.29 36.181.29.28