Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.189.116.86
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39821
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.189.116.86.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 23:00:33 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 86.116.189.142.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 86.116.189.142.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
14.34.28.131 attack
Oct 16 13:24:20 [host] sshd[27846]: Invalid user mono from 14.34.28.131
Oct 16 13:24:20 [host] sshd[27846]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.34.28.131
Oct 16 13:24:22 [host] sshd[27846]: Failed password for invalid user mono from 14.34.28.131 port 47298 ssh2
2019-10-16 20:13:52
94.187.55.214 attackspambots
ENG,WP GET /wp-login.php
2019-10-16 20:31:14
157.119.29.22 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 20:11:04
92.63.194.26 attack
Oct 16 13:51:39 MK-Soft-VM5 sshd[21322]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.26 
Oct 16 13:51:41 MK-Soft-VM5 sshd[21322]: Failed password for invalid user admin from 92.63.194.26 port 42928 ssh2
...
2019-10-16 20:20:01
165.22.91.111 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-16 20:33:13
222.186.175.182 attack
$f2bV_matches
2019-10-16 20:16:11
219.239.47.66 attackbots
Oct 16 14:25:17 MK-Soft-VM6 sshd[17339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.239.47.66 
Oct 16 14:25:19 MK-Soft-VM6 sshd[17339]: Failed password for invalid user ghislain from 219.239.47.66 port 58114 ssh2
...
2019-10-16 20:29:10
66.109.29.6 attackspam
Port 1433 Scan
2019-10-16 20:28:42
213.45.83.55 attack
port scan and connect, tcp 23 (telnet)
2019-10-16 20:02:20
159.89.169.109 attackbots
2019-10-16T11:38:27.281126hub.schaetter.us sshd\[19975\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.109  user=root
2019-10-16T11:38:29.121272hub.schaetter.us sshd\[19975\]: Failed password for root from 159.89.169.109 port 47816 ssh2
2019-10-16T11:47:04.740259hub.schaetter.us sshd\[20057\]: Invalid user nmurthy from 159.89.169.109 port 59194
2019-10-16T11:47:04.747474hub.schaetter.us sshd\[20057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.169.109
2019-10-16T11:47:06.562365hub.schaetter.us sshd\[20057\]: Failed password for invalid user nmurthy from 159.89.169.109 port 59194 ssh2
...
2019-10-16 19:56:00
139.59.56.121 attackbots
Invalid user support from 139.59.56.121 port 57418
2019-10-16 20:04:50
186.136.4.77 attackspam
Automatic report - Port Scan Attack
2019-10-16 20:01:25
60.171.164.47 attackspambots
Brute force attempt
2019-10-16 20:31:35
123.138.18.35 attackbots
2019-10-16T11:53:22.331018abusebot-4.cloudsearch.cf sshd\[1156\]: Invalid user temp from 123.138.18.35 port 42818
2019-10-16 19:54:22
157.55.39.137 attack
Automatic report - Banned IP Access
2019-10-16 20:08:39

Recently Reported IPs

120.140.183.164 134.120.141.173 114.85.142.216 232.152.63.58
71.53.136.59 31.65.102.42 55.171.5.45 151.199.41.50
23.194.186.129 5.105.158.68 3.196.179.233 135.129.35.212
237.97.100.37 78.32.231.224 4.115.57.10 85.161.32.100
84.61.31.41 170.137.196.242 176.102.123.130 107.123.191.158