Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: St. John's

Region: Newfoundland and Labrador

Country: Canada

Internet Service Provider: Bell

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.163.6.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43973
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.163.6.99.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 08:04:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
99.6.163.142.in-addr.arpa domain name pointer lbcynf01-03-142163006099.nf.sympatico.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
99.6.163.142.in-addr.arpa	name = lbcynf01-03-142163006099.nf.sympatico.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
176.31.170.245 attack
Automatic report - Banned IP Access
2019-08-03 15:22:11
68.183.122.211 attackbots
Aug  3 12:39:13 areeb-Workstation sshd\[15383\]: Invalid user zimbra from 68.183.122.211
Aug  3 12:39:13 areeb-Workstation sshd\[15383\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.122.211
Aug  3 12:39:16 areeb-Workstation sshd\[15383\]: Failed password for invalid user zimbra from 68.183.122.211 port 51034 ssh2
...
2019-08-03 15:18:14
104.248.134.200 attackbotsspam
invalid user
2019-08-03 16:01:49
210.227.113.18 attack
Aug  3 07:35:47 localhost sshd\[120209\]: Invalid user valentino from 210.227.113.18 port 41704
Aug  3 07:35:47 localhost sshd\[120209\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.227.113.18
Aug  3 07:35:48 localhost sshd\[120209\]: Failed password for invalid user valentino from 210.227.113.18 port 41704 ssh2
Aug  3 07:40:51 localhost sshd\[120443\]: Invalid user p@ssw0rd from 210.227.113.18 port 35060
Aug  3 07:40:51 localhost sshd\[120443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.227.113.18
...
2019-08-03 15:54:23
206.201.4.211 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-03 04:10:21,566 INFO [shellcode_manager] (206.201.4.211) no match, writing hexdump (2ad11fc69c8bf45c45291a91fbcc9472 :1889543) - MS17010 (EternalBlue)
2019-08-03 15:50:19
94.139.224.216 attackbots
0,50-06/07 [bc06/m25] concatform PostRequest-Spammer scoring: essen
2019-08-03 15:39:04
193.169.252.143 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-03 05:25:35,201 INFO [amun_request_handler] PortScan Detected on Port: 25 (193.169.252.143)
2019-08-03 15:16:46
46.101.101.66 attack
Aug  3 09:16:41 ncomp sshd[482]: Invalid user hadoop from 46.101.101.66
Aug  3 09:16:41 ncomp sshd[482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.101.66
Aug  3 09:16:41 ncomp sshd[482]: Invalid user hadoop from 46.101.101.66
Aug  3 09:16:44 ncomp sshd[482]: Failed password for invalid user hadoop from 46.101.101.66 port 39802 ssh2
2019-08-03 16:07:10
14.169.65.210 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-03 03:23:05,728 INFO [amun_request_handler] PortScan Detected on Port: 445 (14.169.65.210)
2019-08-03 15:27:05
5.55.173.41 attackbotsspam
Telnet Server BruteForce Attack
2019-08-03 15:36:08
180.246.148.20 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-03 03:24:04,951 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.246.148.20)
2019-08-03 15:21:40
200.54.83.52 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-03 03:18:00,879 INFO [amun_request_handler] PortScan Detected on Port: 445 (200.54.83.52)
2019-08-03 15:53:23
117.89.12.205 attackspambots
Aug  3 06:12:34 mail postfix/smtpd[3290]: warning: unknown[117.89.12.205]: SASL LOGIN authentication failed: authentication failure
Aug  3 06:12:40 mail postfix/smtpd[3290]: warning: unknown[117.89.12.205]: SASL LOGIN authentication failed: authentication failure
Aug  3 06:12:48 mail postfix/smtpd[3290]: warning: unknown[117.89.12.205]: SASL LOGIN authentication failed: authentication failure
Aug  3 06:12:55 mail postfix/smtpd[3290]: warning: unknown[117.89.12.205]: SASL LOGIN authentication failed: authentication failure
Aug  3 06:13:01 mail postfix/smtpd[3290]: warning: unknown[117.89.12.205]: SASL LOGIN authentication failed: authentication failure

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=117.89.12.205
2019-08-03 15:33:33
49.236.203.166 attack
Aug  3 07:20:31 MK-Soft-VM4 sshd\[10172\]: Invalid user gz from 49.236.203.166 port 37442
Aug  3 07:20:31 MK-Soft-VM4 sshd\[10172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.236.203.166
Aug  3 07:20:32 MK-Soft-VM4 sshd\[10172\]: Failed password for invalid user gz from 49.236.203.166 port 37442 ssh2
...
2019-08-03 15:47:43
27.70.15.106 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-03 03:27:16,808 INFO [amun_request_handler] PortScan Detected on Port: 445 (27.70.15.106)
2019-08-03 15:12:30

Recently Reported IPs

157.199.215.75 143.97.130.231 202.207.126.164 115.189.201.118
151.63.72.222 133.75.0.233 251.47.151.227 159.91.239.47
42.186.92.120 79.6.16.66 104.14.116.129 212.252.176.158
207.80.222.115 237.90.198.115 168.65.13.17 122.209.142.149
135.255.48.197 227.54.140.123 25.230.164.201 53.68.121.227