Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sanford

Region: Florida

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.196.109.83
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39304
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.196.109.83.			IN	A

;; AUTHORITY SECTION:
.			349	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020092701 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 28 08:22:45 CST 2020
;; MSG SIZE  rcvd: 118
Host info
83.109.196.142.in-addr.arpa domain name pointer 142-196-109-83.res.bhn.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
83.109.196.142.in-addr.arpa	name = 142-196-109-83.res.bhn.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.187.117.34 attack
Unauthorized connection attempt from IP address 41.187.117.34 on Port 445(SMB)
2020-07-11 01:36:06
200.37.197.132 attackspam
2020-07-10T17:14:18.387427abusebot-5.cloudsearch.cf sshd[5258]: Invalid user sp from 200.37.197.132 port 39266
2020-07-10T17:14:18.395357abusebot-5.cloudsearch.cf sshd[5258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.37.197.132
2020-07-10T17:14:18.387427abusebot-5.cloudsearch.cf sshd[5258]: Invalid user sp from 200.37.197.132 port 39266
2020-07-10T17:14:20.290419abusebot-5.cloudsearch.cf sshd[5258]: Failed password for invalid user sp from 200.37.197.132 port 39266 ssh2
2020-07-10T17:18:32.808129abusebot-5.cloudsearch.cf sshd[5305]: Invalid user test12 from 200.37.197.132 port 40170
2020-07-10T17:18:32.814642abusebot-5.cloudsearch.cf sshd[5305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.37.197.132
2020-07-10T17:18:32.808129abusebot-5.cloudsearch.cf sshd[5305]: Invalid user test12 from 200.37.197.132 port 40170
2020-07-10T17:18:34.579221abusebot-5.cloudsearch.cf sshd[5305]: Failed passwor
...
2020-07-11 02:07:49
52.130.85.214 attackspambots
Jul 10 13:54:17 plex-server sshd[62256]: Invalid user bob from 52.130.85.214 port 55762
Jul 10 13:54:17 plex-server sshd[62256]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.130.85.214 
Jul 10 13:54:17 plex-server sshd[62256]: Invalid user bob from 52.130.85.214 port 55762
Jul 10 13:54:19 plex-server sshd[62256]: Failed password for invalid user bob from 52.130.85.214 port 55762 ssh2
Jul 10 13:56:43 plex-server sshd[62468]: Invalid user mia from 52.130.85.214 port 58194
...
2020-07-11 02:01:43
183.83.165.42 attackspambots
Unauthorized connection attempt from IP address 183.83.165.42 on Port 445(SMB)
2020-07-11 01:38:42
201.48.247.23 attackspambots
Unauthorized connection attempt from IP address 201.48.247.23 on Port 445(SMB)
2020-07-11 02:07:22
202.51.106.98 attackspambots
Unauthorized connection attempt from IP address 202.51.106.98 on Port 445(SMB)
2020-07-11 01:46:47
162.243.129.252 attack
Port Scan detected!
...
2020-07-11 02:02:58
201.174.59.122 attack
Unauthorized connection attempt from IP address 201.174.59.122 on Port 445(SMB)
2020-07-11 02:04:15
151.21.54.228 attackspam
Automatic report - Port Scan Attack
2020-07-11 01:47:02
197.138.13.46 attackspam
Unauthorized connection attempt from IP address 197.138.13.46 on Port 445(SMB)
2020-07-11 01:42:24
51.75.18.212 attack
Jul 10 17:46:47 ip-172-31-62-245 sshd\[12973\]: Invalid user suhara from 51.75.18.212\
Jul 10 17:46:50 ip-172-31-62-245 sshd\[12973\]: Failed password for invalid user suhara from 51.75.18.212 port 42158 ssh2\
Jul 10 17:49:40 ip-172-31-62-245 sshd\[12981\]: Invalid user albertv from 51.75.18.212\
Jul 10 17:49:41 ip-172-31-62-245 sshd\[12981\]: Failed password for invalid user albertv from 51.75.18.212 port 36442 ssh2\
Jul 10 17:52:36 ip-172-31-62-245 sshd\[13019\]: Invalid user websites from 51.75.18.212\
2020-07-11 02:08:36
124.160.96.249 attack
Jul 10 22:56:55 webhost01 sshd[23825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.160.96.249
Jul 10 22:56:57 webhost01 sshd[23825]: Failed password for invalid user tamika from 124.160.96.249 port 38203 ssh2
...
2020-07-11 01:51:25
95.180.235.195 attackspambots
Unauthorized connection attempt from IP address 95.180.235.195 on Port 445(SMB)
2020-07-11 01:44:31
113.168.11.62 attackspam
Unauthorized connection attempt from IP address 113.168.11.62 on Port 445(SMB)
2020-07-11 01:54:22
162.247.74.27 attackbots
2020-07-10 11:43:30.193946-0500  localhost sshd[40923]: Failed password for root from 162.247.74.27 port 38280 ssh2
2020-07-11 02:01:07

Recently Reported IPs

64.166.164.45 111.42.196.201 200.59.106.117 73.121.105.220
182.38.87.157 150.66.140.235 12.67.197.13 117.148.116.251
78.252.10.130 177.121.209.194 80.133.199.64 18.11.132.231
120.242.128.52 77.48.162.21 210.235.166.188 210.106.249.147
213.65.95.155 44.214.144.239 133.11.40.168 217.100.249.194