Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       142.202.4.0 - 142.202.7.255
CIDR:           142.202.4.0/22
NetName:        REPRISE-HOSTING6
NetHandle:      NET-142-202-4-0-1
Parent:         NET142 (NET-142-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Reprise Hosting (RHL-72)
RegDate:        2019-12-18
Updated:        2019-12-18
Ref:            https://rdap.arin.net/registry/ip/142.202.4.0


OrgName:        Reprise Hosting
OrgId:          RHL-72
Address:        4739 University Way NE
Address:        #110
City:           Seattle
StateProv:      WA
PostalCode:     98105
Country:        US
RegDate:        2016-11-14
Updated:        2016-11-23
Ref:            https://rdap.arin.net/registry/entity/RHL-72


OrgAbuseHandle: NOC13394-ARIN
OrgAbuseName:   Network Operations Center
OrgAbusePhone:  +1-877-467-8839 
OrgAbuseEmail:  admin@reprisehosting.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NOC13394-ARIN

OrgNOCHandle: NOC13394-ARIN
OrgNOCName:   Network Operations Center
OrgNOCPhone:  +1-877-467-8839 
OrgNOCEmail:  admin@reprisehosting.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/NOC13394-ARIN

OrgTechHandle: NOC13394-ARIN
OrgTechName:   Network Operations Center
OrgTechPhone:  +1-877-467-8839 
OrgTechEmail:  admin@reprisehosting.com
OrgTechRef:    https://rdap.arin.net/registry/entity/NOC13394-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.202.4.50
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28517
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.202.4.50.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026030800 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 08 21:01:42 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 50.4.202.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 50.4.202.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
219.250.188.165 attackbots
SSH bruteforce
2020-06-24 12:37:40
98.143.148.45 attack
Jun 24 05:57:39 ns3164893 sshd[30280]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.143.148.45
Jun 24 05:57:40 ns3164893 sshd[30280]: Failed password for invalid user svn from 98.143.148.45 port 44692 ssh2
...
2020-06-24 12:36:10
212.70.149.2 attackspam
Jun 24 06:51:04 srv01 postfix/smtpd\[17537\]: warning: unknown\[212.70.149.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 06:51:16 srv01 postfix/smtpd\[10111\]: warning: unknown\[212.70.149.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 06:51:32 srv01 postfix/smtpd\[15599\]: warning: unknown\[212.70.149.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 06:51:46 srv01 postfix/smtpd\[17667\]: warning: unknown\[212.70.149.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 24 06:51:51 srv01 postfix/smtpd\[10103\]: warning: unknown\[212.70.149.2\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-24 12:54:07
174.219.139.64 attackbots
Brute forcing email accounts
2020-06-24 12:52:40
45.9.148.91 attackspambots
Unauthorized connection attempt detected from IP address 45.9.148.91 to port 53
2020-06-24 12:48:06
218.149.128.186 attack
Jun 24 01:58:18 firewall sshd[5541]: Invalid user testuser from 218.149.128.186
Jun 24 01:58:20 firewall sshd[5541]: Failed password for invalid user testuser from 218.149.128.186 port 44036 ssh2
Jun 24 02:02:17 firewall sshd[5636]: Invalid user fileshare from 218.149.128.186
...
2020-06-24 13:08:40
212.70.149.34 attackspambots
2020-06-24 07:41:50 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=unix@org.ua\)2020-06-24 07:42:25 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=unknown@org.ua\)2020-06-24 07:43:04 dovecot_login authenticator failed for \(User\) \[212.70.149.34\]: 535 Incorrect authentication data \(set_id=unsub@org.ua\)
...
2020-06-24 12:58:12
142.93.226.18 attack
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: go.indymeeting.com.
2020-06-24 12:53:03
5.135.224.152 attack
2020-06-23T23:34:52.6371971495-001 sshd[22780]: Invalid user backup from 5.135.224.152 port 54452
2020-06-23T23:34:52.6408811495-001 sshd[22780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip152.ip-5-135-224.eu
2020-06-23T23:34:52.6371971495-001 sshd[22780]: Invalid user backup from 5.135.224.152 port 54452
2020-06-23T23:34:54.9046531495-001 sshd[22780]: Failed password for invalid user backup from 5.135.224.152 port 54452 ssh2
2020-06-23T23:37:57.5551811495-001 sshd[22921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip152.ip-5-135-224.eu  user=root
2020-06-23T23:37:59.4354701495-001 sshd[22921]: Failed password for root from 5.135.224.152 port 53588 ssh2
...
2020-06-24 12:53:39
150.136.160.223 attack
Invalid user ras from 150.136.160.223 port 41196
2020-06-24 12:38:16
36.155.115.227 attackspambots
Jun 24 04:55:48 hcbbdb sshd\[10423\]: Invalid user yangjw from 36.155.115.227
Jun 24 04:55:48 hcbbdb sshd\[10423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.227
Jun 24 04:55:51 hcbbdb sshd\[10423\]: Failed password for invalid user yangjw from 36.155.115.227 port 37688 ssh2
Jun 24 04:57:07 hcbbdb sshd\[10603\]: Invalid user sonar from 36.155.115.227
Jun 24 04:57:07 hcbbdb sshd\[10603\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.227
2020-06-24 12:59:45
36.153.84.58 attackspambots
06/23/2020-23:57:03.129919 36.153.84.58 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-24 13:14:59
110.50.85.28 attack
$f2bV_matches
2020-06-24 12:56:04
123.206.64.111 attackbotsspam
Invalid user katrina from 123.206.64.111 port 51486
2020-06-24 13:06:00
106.12.210.77 attackspambots
SSH invalid-user multiple login try
2020-06-24 13:00:56

Recently Reported IPs

192.177.148.11 20.215.208.157 87.121.84.76 58.19.79.120
1.24.16.180 122.96.28.240 124.238.165.237 20.169.50.188
38.128.155.49 39.128.155.49 203.131.242.177 142.250.199.68
31.57.10.185 185.208.158.144 38.85.249.49 101.36.97.187
2409:8950:b3f8:1214:997e:3d53:3bb6:f08d 109.205.183.226 165.232.123.192 139.59.146.174