Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.195.139.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59768
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.195.139.126.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012800 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 28 21:19:46 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 126.139.195.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 126.139.195.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.177.215.195 attackspambots
SSH-BruteForce
2019-12-21 09:28:26
187.87.228.222 attack
port scan and connect, tcp 23 (telnet)
2019-12-21 13:34:16
185.176.27.246 attack
12/21/2019-06:06:02.623728 185.176.27.246 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-21 13:13:46
222.186.175.215 attackspambots
Dec 18 18:35:16 microserver sshd[54437]: Failed none for root from 222.186.175.215 port 34406 ssh2
Dec 18 18:35:21 microserver sshd[54437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Dec 18 18:35:23 microserver sshd[54437]: Failed password for root from 222.186.175.215 port 34406 ssh2
Dec 18 18:35:27 microserver sshd[54437]: Failed password for root from 222.186.175.215 port 34406 ssh2
Dec 18 18:35:31 microserver sshd[54437]: Failed password for root from 222.186.175.215 port 34406 ssh2
Dec 18 20:44:38 microserver sshd[10273]: Failed none for root from 222.186.175.215 port 61016 ssh2
Dec 18 20:44:39 microserver sshd[10273]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.215  user=root
Dec 18 20:44:40 microserver sshd[10273]: Failed password for root from 222.186.175.215 port 61016 ssh2
Dec 18 20:44:44 microserver sshd[10273]: Failed password for root from 222.186.175.215 port 61016 ssh2
2019-12-21 13:38:48
43.248.187.45 attackbots
Triggered by Fail2Ban at Vostok web server
2019-12-21 13:18:48
181.174.125.86 attackbotsspam
Dec 21 05:03:20 zeus sshd[20939]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.174.125.86 
Dec 21 05:03:22 zeus sshd[20939]: Failed password for invalid user savannah from 181.174.125.86 port 54450 ssh2
Dec 21 05:08:53 zeus sshd[21087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.174.125.86 
Dec 21 05:08:55 zeus sshd[21087]: Failed password for invalid user murata from 181.174.125.86 port 43403 ssh2
2019-12-21 13:22:52
149.89.18.103 attack
Dec 21 05:54:17 lnxmysql61 sshd[23752]: Failed password for root from 149.89.18.103 port 56710 ssh2
Dec 21 05:59:39 lnxmysql61 sshd[24351]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.89.18.103
Dec 21 05:59:41 lnxmysql61 sshd[24351]: Failed password for invalid user in from 149.89.18.103 port 32874 ssh2
2019-12-21 13:02:07
138.197.84.99 attack
Dec 21 06:34:35 server sshd\[13797\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.84.99  user=dovecot
Dec 21 06:34:36 server sshd\[13797\]: Failed password for dovecot from 138.197.84.99 port 51382 ssh2
Dec 21 07:58:15 server sshd\[3956\]: Invalid user georgiean from 138.197.84.99
Dec 21 07:58:15 server sshd\[3956\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.84.99 
Dec 21 07:58:17 server sshd\[3956\]: Failed password for invalid user georgiean from 138.197.84.99 port 51704 ssh2
...
2019-12-21 13:35:42
187.126.120.104 attackbotsspam
Dec 21 00:16:49 plusreed sshd[24831]: Invalid user nfs from 187.126.120.104
...
2019-12-21 13:31:04
186.4.123.139 attackspambots
Dec 21 06:06:47 eventyay sshd[25554]: Failed password for root from 186.4.123.139 port 50450 ssh2
Dec 21 06:13:26 eventyay sshd[25752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.4.123.139
Dec 21 06:13:28 eventyay sshd[25752]: Failed password for invalid user admin from 186.4.123.139 port 53145 ssh2
...
2019-12-21 13:22:29
84.95.150.70 attackbotsspam
Wordpress Admin Login attack
2019-12-21 13:03:32
121.204.151.95 attackspam
Dec 21 05:36:53 mail sshd[21387]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.204.151.95  user=root
Dec 21 05:36:55 mail sshd[21387]: Failed password for root from 121.204.151.95 port 33422 ssh2
Dec 21 05:58:33 mail sshd[22324]: Invalid user nfs from 121.204.151.95
...
2019-12-21 13:27:16
27.128.234.169 attackspambots
Dec 20 14:55:26 kapalua sshd\[22136\]: Invalid user lezilie from 27.128.234.169
Dec 20 14:55:26 kapalua sshd\[22136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.234.169
Dec 20 14:55:28 kapalua sshd\[22136\]: Failed password for invalid user lezilie from 27.128.234.169 port 43048 ssh2
Dec 20 15:02:19 kapalua sshd\[22780\]: Invalid user dalessandro from 27.128.234.169
Dec 20 15:02:19 kapalua sshd\[22780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.234.169
2019-12-21 09:27:29
104.248.65.180 attackspam
Dec 21 05:53:49 lnxweb61 sshd[18396]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.65.180
Dec 21 05:53:50 lnxweb61 sshd[18396]: Failed password for invalid user server from 104.248.65.180 port 39350 ssh2
Dec 21 05:59:00 lnxweb61 sshd[22419]: Failed password for root from 104.248.65.180 port 44596 ssh2
2019-12-21 13:07:12
122.121.176.204 attackspam
Unauthorized connection attempt detected from IP address 122.121.176.204 to port 445
2019-12-21 13:25:27

Recently Reported IPs

141.48.207.215 37.111.44.129 178.36.242.83 99.175.21.101
198.49.167.218 36.224.150.0 230.18.44.78 31.175.147.219
182.173.172.224 172.240.191.62 122.33.81.237 15.170.187.205
91.162.132.116 171.97.160.247 177.183.108.69 138.124.185.85
169.3.225.28 243.50.117.12 78.138.126.107 75.225.0.233