Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Prince George

Region: British Columbia

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.207.19.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62574
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.207.19.99.			IN	A

;; AUTHORITY SECTION:
.			491	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020071801 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jul 19 08:54:48 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 99.19.207.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.19.207.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.198.164.174 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:41:45,259 INFO [amun_request_handler] PortScan Detected on Port: 445 (117.198.164.174)
2019-08-04 09:47:17
14.143.245.10 attackbotsspam
Aug  4 04:13:59 www5 sshd\[15742\]: Invalid user guest from 14.143.245.10
Aug  4 04:13:59 www5 sshd\[15742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.143.245.10
Aug  4 04:14:01 www5 sshd\[15742\]: Failed password for invalid user guest from 14.143.245.10 port 57125 ssh2
...
2019-08-04 09:21:44
189.206.168.41 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:42:56,599 INFO [amun_request_handler] PortScan Detected on Port: 445 (189.206.168.41)
2019-08-04 09:40:09
66.115.168.210 attackbots
Aug  4 08:23:14 webhost01 sshd[11305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.115.168.210
Aug  4 08:23:16 webhost01 sshd[11305]: Failed password for invalid user wwwtest from 66.115.168.210 port 52280 ssh2
...
2019-08-04 09:43:28
36.37.223.208 attackbotsspam
Automatic report - Banned IP Access
2019-08-04 09:16:35
23.247.118.10 attackbots
Excessive Port-Scanning
2019-08-04 09:47:47
140.143.227.43 attackspambots
Aug  4 02:53:28 [host] sshd[21970]: Invalid user vikas from 140.143.227.43
Aug  4 02:53:28 [host] sshd[21970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.227.43
Aug  4 02:53:30 [host] sshd[21970]: Failed password for invalid user vikas from 140.143.227.43 port 44012 ssh2
2019-08-04 09:17:43
189.213.105.186 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 01:00:06,474 INFO [amun_request_handler] PortScan Detected on Port: 445 (189.213.105.186)
2019-08-04 10:05:21
182.114.253.138 attackspambots
1564880012 - 08/04/2019 02:53:32 Host: hn.kd.ny.adsl/182.114.253.138 Port: 5353 UDP Blocked
2019-08-04 09:17:22
219.233.194.178 attackbotsspam
Aug  4 02:49:04 MainVPS sshd[5823]: Invalid user tecnico from 219.233.194.178 port 50606
Aug  4 02:49:04 MainVPS sshd[5823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.233.194.178
Aug  4 02:49:04 MainVPS sshd[5823]: Invalid user tecnico from 219.233.194.178 port 50606
Aug  4 02:49:06 MainVPS sshd[5823]: Failed password for invalid user tecnico from 219.233.194.178 port 50606 ssh2
Aug  4 02:53:07 MainVPS sshd[6093]: Invalid user vika from 219.233.194.178 port 42870
...
2019-08-04 09:35:22
164.132.98.75 attackbots
Aug  4 02:52:25 vmd17057 sshd\[14775\]: Invalid user usuario from 164.132.98.75 port 42134
Aug  4 02:52:25 vmd17057 sshd\[14775\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=164.132.98.75
Aug  4 02:52:27 vmd17057 sshd\[14775\]: Failed password for invalid user usuario from 164.132.98.75 port 42134 ssh2
...
2019-08-04 09:52:11
88.201.2.49 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-04 00:46:53,932 INFO [amun_request_handler] PortScan Detected on Port: 445 (88.201.2.49)
2019-08-04 09:24:46
121.8.153.194 attackbots
Aug  4 02:52:21 microserver sshd[33572]: Invalid user web from 121.8.153.194 port 34682
Aug  4 02:52:21 microserver sshd[33572]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.8.153.194
Aug  4 02:52:23 microserver sshd[33572]: Failed password for invalid user web from 121.8.153.194 port 34682 ssh2
Aug  4 02:56:24 microserver sshd[34346]: Invalid user maestro from 121.8.153.194 port 55590
Aug  4 02:56:24 microserver sshd[34346]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.8.153.194
Aug  4 03:08:33 microserver sshd[36188]: Invalid user oracle from 121.8.153.194 port 54176
Aug  4 03:08:33 microserver sshd[36188]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.8.153.194
Aug  4 03:08:35 microserver sshd[36188]: Failed password for invalid user oracle from 121.8.153.194 port 54176 ssh2
Aug  4 03:13:11 microserver sshd[37141]: Invalid user didi from 121.8.153.194 port 10867
Aug  4
2019-08-04 09:54:35
200.107.154.3 attackbotsspam
Aug  4 03:43:18 pkdns2 sshd\[33114\]: Invalid user bob3297 from 200.107.154.3Aug  4 03:43:19 pkdns2 sshd\[33114\]: Failed password for invalid user bob3297 from 200.107.154.3 port 61273 ssh2Aug  4 03:48:08 pkdns2 sshd\[33307\]: Invalid user qwerty from 200.107.154.3Aug  4 03:48:10 pkdns2 sshd\[33307\]: Failed password for invalid user qwerty from 200.107.154.3 port 30545 ssh2Aug  4 03:53:01 pkdns2 sshd\[33499\]: Invalid user humberto from 200.107.154.3Aug  4 03:53:03 pkdns2 sshd\[33499\]: Failed password for invalid user humberto from 200.107.154.3 port 56259 ssh2
...
2019-08-04 09:36:39
54.36.118.29 attack
fail2ban honeypot
2019-08-04 09:19:19

Recently Reported IPs

46.189.240.109 68.222.106.71 97.80.131.0 153.92.67.234
203.186.79.0 66.136.46.215 187.190.190.122 126.48.201.166
173.30.55.232 79.10.34.0 93.67.207.189 114.181.57.93
65.99.155.141 67.216.182.91 72.118.160.65 69.140.36.238
185.101.9.239 54.226.113.116 72.222.102.186 118.139.110.202