Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Regina

Region: Saskatchewan

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.165.154.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52965
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.165.154.143.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120600 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 06 22:31:19 CST 2024
;; MSG SIZE  rcvd: 108
Host info
143.154.165.142.in-addr.arpa domain name pointer 142-165-154-143.prna.hsdb.sasknet.sk.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
143.154.165.142.in-addr.arpa	name = 142-165-154-143.prna.hsdb.sasknet.sk.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.232.109.77 attackspambots
Honeypot attack, port: 445, PTR: static.vnpt.vn.
2020-03-02 13:32:11
36.227.39.187 attackbots
Unauthorized connection attempt detected from IP address 36.227.39.187 to port 4567 [J]
2020-03-02 14:11:22
217.100.210.82 attackspambots
Unauthorized connection attempt detected from IP address 217.100.210.82 to port 23 [J]
2020-03-02 14:02:10
117.239.238.70 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-02 13:43:20
95.181.182.153 attackspam
B: Magento admin pass test (wrong country)
2020-03-02 13:37:37
2.187.234.11 attack
Unauthorized connection attempt detected from IP address 2.187.234.11 to port 80 [J]
2020-03-02 14:12:51
5.42.83.230 attackbots
Unauthorized connection attempt detected from IP address 5.42.83.230 to port 23 [J]
2020-03-02 14:12:33
112.85.42.176 attack
Mar  2 06:35:44 vps647732 sshd[12172]: Failed password for root from 112.85.42.176 port 46158 ssh2
Mar  2 06:35:54 vps647732 sshd[12172]: Failed password for root from 112.85.42.176 port 46158 ssh2
...
2020-03-02 13:39:42
122.117.152.28 attack
Unauthorized connection attempt detected from IP address 122.117.152.28 to port 23 [J]
2020-03-02 14:05:06
150.109.164.235 attackbotsspam
firewall-block, port(s): 8030/tcp
2020-03-02 14:03:29
79.115.55.12 attackspam
Unauthorized connection attempt detected from IP address 79.115.55.12 to port 23 [J]
2020-03-02 14:09:58
49.51.153.85 attack
Unauthorized connection attempt detected from IP address 49.51.153.85 to port 8999 [J]
2020-03-02 14:10:50
31.173.1.14 attackbotsspam
" "
2020-03-02 13:35:35
138.255.73.253 attack
Unauthorized connection attempt detected from IP address 138.255.73.253 to port 88 [J]
2020-03-02 13:34:57
220.176.172.64 attackspambots
Unauthorized connection attempt detected from IP address 220.176.172.64 to port 1433 [J]
2020-03-02 14:01:37

Recently Reported IPs

220.165.64.114 237.166.239.183 96.127.195.168 191.141.24.24
146.221.123.130 24.83.67.127 145.95.27.59 22.248.248.238
220.87.226.48 172.145.96.245 225.232.78.26 49.1.47.132
201.219.115.216 31.115.131.218 167.153.174.101 21.5.58.107
45.19.87.69 184.91.237.138 53.237.223.7 244.2.245.129