Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Calgary

Region: Alberta

Country: Canada

Internet Service Provider: Telus

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.179.157.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.179.157.164.		IN	A

;; AUTHORITY SECTION:
.			546	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100702 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 08 04:11:06 CST 2019
;; MSG SIZE  rcvd: 119
Host info
164.157.179.142.in-addr.arpa domain name pointer s142-179-157-164.ab.hsia.telus.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.157.179.142.in-addr.arpa	name = s142-179-157-164.ab.hsia.telus.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
159.203.201.94 attackbots
01/07/2020-10:09:11.887630 159.203.201.94 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-08 00:52:26
140.238.240.170 attackbots
mail auth brute force
2020-01-08 00:39:11
198.186.13.20 attackspam
tcp 9000
2020-01-08 00:41:16
117.212.228.232 attackspam
Unauthorized connection attempt from IP address 117.212.228.232 on Port 445(SMB)
2020-01-08 00:23:52
205.153.117.138 attackspam
Port 1433 Scan
2020-01-08 00:31:45
87.67.191.52 attack
Jan  7 17:00:04 cvbnet sshd[29609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.67.191.52 
Jan  7 17:00:06 cvbnet sshd[29609]: Failed password for invalid user leoshih from 87.67.191.52 port 52370 ssh2
...
2020-01-08 00:14:27
5.126.15.225 attackbots
Unauthorized connection attempt from IP address 5.126.15.225 on Port 445(SMB)
2020-01-08 00:50:05
218.60.148.25 attackbots
Unauthorized connection attempt detected from IP address 218.60.148.25 to port 8088 [J]
2020-01-08 00:44:37
186.206.135.130 attackbotsspam
Unauthorized connection attempt detected from IP address 186.206.135.130 to port 2220 [J]
2020-01-08 00:16:46
36.66.151.227 attackbots
winbox attack
2020-01-08 00:19:46
114.119.135.133 attack
badbot
2020-01-08 00:26:19
203.130.1.162 attack
Port 1433 Scan
2020-01-08 00:34:52
94.179.128.205 attackspam
Jan  7 14:03:01 h2570396 sshd[16586]: Failed password for invalid user files from 94.179.128.205 port 34534 ssh2
Jan  7 14:03:01 h2570396 sshd[16586]: Received disconnect from 94.179.128.205: 11: Bye Bye [preauth]
Jan  7 14:17:46 h2570396 sshd[16696]: Failed password for invalid user ig from 94.179.128.205 port 44046 ssh2
Jan  7 14:17:46 h2570396 sshd[16696]: Received disconnect from 94.179.128.205: 11: Bye Bye [preauth]
Jan  7 14:24:23 h2570396 sshd[16707]: Failed password for invalid user volfe from 94.179.128.205 port 57280 ssh2
Jan  7 14:24:23 h2570396 sshd[16707]: Received disconnect from 94.179.128.205: 11: Bye Bye [preauth]
Jan  7 14:30:48 h2570396 sshd[16744]: Failed password for invalid user service from 94.179.128.205 port 42256 ssh2
Jan  7 14:30:48 h2570396 sshd[16744]: Received disconnect from 94.179.128.205: 11: Bye Bye [preauth]
Jan  7 14:37:12 h2570396 sshd[16761]: Failed password for invalid user webmaster from 94.179.128.205 port 55704 ssh2
Jan  7 14:37........
-------------------------------
2020-01-08 00:39:48
178.159.217.13 attackbotsspam
firewall-block, port(s): 1433/tcp
2020-01-08 00:45:38
138.121.34.140 attack
Unauthorized connection attempt from IP address 138.121.34.140 on Port 445(SMB)
2020-01-08 00:25:51

Recently Reported IPs

92.100.122.128 247.237.120.153 178.62.37.168 210.182.71.234
153.44.28.130 233.201.160.201 13.58.203.186 1.185.205.71
6.108.153.137 12.8.254.22 11.83.177.146 228.2.46.183
80.50.156.161 147.63.88.226 76.101.172.217 234.176.21.203
248.113.73.108 215.103.84.158 55.27.102.14 177.148.126.151