Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.196.228.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29514
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.196.228.146.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 14:03:08 CST 2025
;; MSG SIZE  rcvd: 108
Host info
146.228.196.142.in-addr.arpa domain name pointer syn-142-196-228-146.res.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
146.228.196.142.in-addr.arpa	name = syn-142-196-228-146.res.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
120.70.103.40 attackspambots
Dec 16 16:24:44 sd-53420 sshd\[23285\]: User root from 120.70.103.40 not allowed because none of user's groups are listed in AllowGroups
Dec 16 16:24:44 sd-53420 sshd\[23285\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.103.40  user=root
Dec 16 16:24:45 sd-53420 sshd\[23285\]: Failed password for invalid user root from 120.70.103.40 port 50734 ssh2
Dec 16 16:33:29 sd-53420 sshd\[26631\]: Invalid user guest from 120.70.103.40
Dec 16 16:33:29 sd-53420 sshd\[26631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.70.103.40
...
2019-12-17 04:20:55
46.101.77.58 attackspambots
--- report ---
Dec 16 11:39:52 sshd: Connection from 46.101.77.58 port 37967
Dec 16 11:39:53 sshd: Invalid user jisu123 from 46.101.77.58
Dec 16 11:39:55 sshd: Failed password for invalid user jisu123 from 46.101.77.58 port 37967 ssh2
Dec 16 11:39:55 sshd: Received disconnect from 46.101.77.58: 11: Bye Bye [preauth]
2019-12-17 04:25:43
149.202.180.143 attackbotsspam
Invalid user fong from 149.202.180.143 port 56760
2019-12-17 04:26:55
61.12.38.162 attackbotsspam
2019-12-16T16:28:48.126232abusebot-7.cloudsearch.cf sshd\[731\]: Invalid user viste from 61.12.38.162 port 44842
2019-12-16T16:28:48.132570abusebot-7.cloudsearch.cf sshd\[731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.38.162
2019-12-16T16:28:50.032064abusebot-7.cloudsearch.cf sshd\[731\]: Failed password for invalid user viste from 61.12.38.162 port 44842 ssh2
2019-12-16T16:34:59.207883abusebot-7.cloudsearch.cf sshd\[830\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.12.38.162  user=root
2019-12-17 04:03:34
187.162.135.130 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-17 04:07:26
40.92.40.20 attackbotsspam
Dec 16 22:46:24 debian-2gb-vpn-nbg1-1 kernel: [903952.888101] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=40.92.40.20 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=234 ID=48785 DF PROTO=TCP SPT=8480 DPT=25 WINDOW=0 RES=0x00 ACK RST URGP=0
2019-12-17 04:13:17
111.242.131.244 attack
port 23
2019-12-17 04:01:01
123.206.128.207 attackbotsspam
Invalid user server from 123.206.128.207 port 52724
2019-12-17 04:10:55
138.68.105.194 attackspambots
Dec 16 18:11:00 vps647732 sshd[25761]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.105.194
Dec 16 18:11:02 vps647732 sshd[25761]: Failed password for invalid user huey from 138.68.105.194 port 45194 ssh2
...
2019-12-17 04:24:50
77.40.28.135 attackbots
Dec 16 15:35:58 mail postfix/smtps/smtpd[26137]: warning: unknown[77.40.28.135]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 16 15:36:08 mail postfix/smtpd[26278]: warning: unknown[77.40.28.135]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 16 15:36:41 mail postfix/smtpd[26463]: warning: unknown[77.40.28.135]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-12-17 04:15:47
54.38.242.233 attack
Dec 16 19:21:24 pornomens sshd\[30385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.233  user=daemon
Dec 16 19:21:26 pornomens sshd\[30385\]: Failed password for daemon from 54.38.242.233 port 41534 ssh2
Dec 16 19:26:19 pornomens sshd\[30428\]: Invalid user vcsa from 54.38.242.233 port 47608
Dec 16 19:26:19 pornomens sshd\[30428\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.38.242.233
...
2019-12-17 04:16:14
221.133.0.1 attackbots
Dec 16 09:51:53 php1 sshd\[22075\]: Invalid user password from 221.133.0.1
Dec 16 09:51:53 php1 sshd\[22075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hcmc.saigonnet.vn
Dec 16 09:51:55 php1 sshd\[22075\]: Failed password for invalid user password from 221.133.0.1 port 53107 ssh2
Dec 16 10:00:35 php1 sshd\[23287\]: Invalid user oratest from 221.133.0.1
Dec 16 10:00:35 php1 sshd\[23287\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=hcmc.saigonnet.vn
2019-12-17 04:17:13
187.137.121.253 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-17 04:17:55
202.143.111.156 attackbotsspam
Dec 16 21:01:16 MK-Soft-VM5 sshd[18623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.143.111.156 
Dec 16 21:01:18 MK-Soft-VM5 sshd[18623]: Failed password for invalid user antinucci from 202.143.111.156 port 48002 ssh2
...
2019-12-17 04:01:54
62.210.119.149 attackspam
Dec 16 20:00:01 MainVPS sshd[19350]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.119.149  user=root
Dec 16 20:00:04 MainVPS sshd[19350]: Failed password for root from 62.210.119.149 port 35332 ssh2
Dec 16 20:05:12 MainVPS sshd[28904]: Invalid user ching from 62.210.119.149 port 52012
Dec 16 20:05:12 MainVPS sshd[28904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.119.149
Dec 16 20:05:12 MainVPS sshd[28904]: Invalid user ching from 62.210.119.149 port 52012
Dec 16 20:05:14 MainVPS sshd[28904]: Failed password for invalid user ching from 62.210.119.149 port 52012 ssh2
...
2019-12-17 04:27:48

Recently Reported IPs

230.111.28.200 222.22.93.130 86.0.239.93 70.90.45.206
58.240.62.240 205.143.104.91 230.168.104.9 22.97.143.108
141.96.114.31 57.175.190.95 30.179.15.78 70.13.179.52
73.79.54.129 140.89.193.46 125.141.114.205 81.45.111.119
228.83.69.110 188.55.5.91 181.132.8.182 92.174.194.182