Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.21.48.119
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7776
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.21.48.119.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 22:51:42 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 119.48.21.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 119.48.21.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.71.210.7 attackbotsspam
Sep 15 10:02:05 inter-technics sshd[26790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.7  user=root
Sep 15 10:02:07 inter-technics sshd[26790]: Failed password for root from 167.71.210.7 port 59368 ssh2
Sep 15 10:06:38 inter-technics sshd[27098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.7  user=root
Sep 15 10:06:40 inter-technics sshd[27098]: Failed password for root from 167.71.210.7 port 42664 ssh2
Sep 15 10:11:16 inter-technics sshd[27440]: Invalid user ftp from 167.71.210.7 port 54198
...
2020-09-15 16:16:04
115.85.53.91 attack
Sep 15 09:43:33 fhem-rasp sshd[12124]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.85.53.91  user=root
Sep 15 09:43:36 fhem-rasp sshd[12124]: Failed password for root from 115.85.53.91 port 57196 ssh2
...
2020-09-15 16:10:27
112.226.75.155 attackbotsspam
DATE:2020-09-14 18:57:02, IP:112.226.75.155, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-09-15 16:17:18
80.211.40.246 attack
Failed password for invalid user root from 80.211.40.246 port 44042 ssh2
2020-09-15 16:10:58
129.144.183.81 attackspambots
Unauthorized SSH login attempts
2020-09-15 16:13:57
104.248.138.121 attackbotsspam
Sep 15 10:17:29 [-] sshd[15089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.138.121  user=root
Sep 15 10:17:30 [-] sshd[15089]: Failed password for invalid user root from 104.248.138.121 port 52676 ssh2
Sep 15 10:26:48 [-] sshd[15284]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.138.121  user=root
2020-09-15 16:28:37
192.145.99.71 attackbots
Sep 15 03:42:48 our-server-hostname sshd[30783]: Address 192.145.99.71 maps to aofy.ru, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 15 03:42:48 our-server-hostname sshd[30783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.145.99.71  user=r.r
Sep 15 03:42:50 our-server-hostname sshd[30783]: Failed password for r.r from 192.145.99.71 port 60175 ssh2
Sep 15 03:59:06 our-server-hostname sshd[32531]: Address 192.145.99.71 maps to aofy.ru, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Sep 15 03:59:06 our-server-hostname sshd[32531]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.145.99.71  user=r.r
Sep 15 03:59:08 our-server-hostname sshd[32531]: Failed password for r.r from 192.145.99.71 port 40733 ssh2
Sep 15 04:03:54 our-server-hostname sshd[547]: Address 192.145.99.71 maps to aofy.ru, but this does not map back to the address ........
-------------------------------
2020-09-15 16:12:26
123.157.219.83 attackspambots
Sep 15 03:34:11 h2646465 sshd[11631]: Invalid user star from 123.157.219.83
Sep 15 03:34:11 h2646465 sshd[11631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.157.219.83
Sep 15 03:34:11 h2646465 sshd[11631]: Invalid user star from 123.157.219.83
Sep 15 03:34:12 h2646465 sshd[11631]: Failed password for invalid user star from 123.157.219.83 port 29545 ssh2
Sep 15 03:46:28 h2646465 sshd[13407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.157.219.83  user=root
Sep 15 03:46:30 h2646465 sshd[13407]: Failed password for root from 123.157.219.83 port 47152 ssh2
Sep 15 03:50:13 h2646465 sshd[13977]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.157.219.83  user=root
Sep 15 03:50:16 h2646465 sshd[13977]: Failed password for root from 123.157.219.83 port 23075 ssh2
Sep 15 03:54:04 h2646465 sshd[14097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse
2020-09-15 16:12:04
134.209.106.187 attack
134.209.106.187 (SG/Singapore/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Sep 15 04:18:17 server5 sshd[30407]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.106.187  user=root
Sep 15 04:18:17 server5 sshd[30399]: Failed password for root from 117.103.168.204 port 39584 ssh2
Sep 15 04:17:30 server5 sshd[29877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.43.5  user=root
Sep 15 04:17:31 server5 sshd[29877]: Failed password for root from 165.22.43.5 port 41030 ssh2
Sep 15 04:17:47 server5 sshd[30189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.57.2  user=root
Sep 15 04:17:49 server5 sshd[30189]: Failed password for root from 139.59.57.2 port 45714 ssh2

IP Addresses Blocked:
2020-09-15 16:25:56
182.74.25.246 attackbotsspam
2020-09-15T10:21:50.388778ks3355764 sshd[16788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.74.25.246  user=root
2020-09-15T10:21:52.797937ks3355764 sshd[16788]: Failed password for root from 182.74.25.246 port 18398 ssh2
...
2020-09-15 16:40:05
84.3.123.178 attack
2020-09-15T02:37:15.652929yoshi.linuxbox.ninja sshd[479775]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.3.123.178
2020-09-15T02:37:15.649889yoshi.linuxbox.ninja sshd[479775]: Invalid user ubnt from 84.3.123.178 port 51734
2020-09-15T02:37:16.832582yoshi.linuxbox.ninja sshd[479775]: Failed password for invalid user ubnt from 84.3.123.178 port 51734 ssh2
...
2020-09-15 16:29:34
156.54.170.118 attackspam
(sshd) Failed SSH login from 156.54.170.118 (IT/Italy/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 15 03:54:23 jbs1 sshd[23031]: Invalid user sshadm from 156.54.170.118
Sep 15 03:54:23 jbs1 sshd[23031]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.54.170.118 
Sep 15 03:54:25 jbs1 sshd[23031]: Failed password for invalid user sshadm from 156.54.170.118 port 45693 ssh2
Sep 15 03:58:32 jbs1 sshd[24348]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.54.170.118  user=root
Sep 15 03:58:34 jbs1 sshd[24348]: Failed password for root from 156.54.170.118 port 53131 ssh2
2020-09-15 16:15:05
51.178.51.152 attackbots
Invalid user fragocompta from 51.178.51.152 port 47026
2020-09-15 16:32:36
189.207.46.15 attackspam
SSH brute-force attempt
2020-09-15 16:16:48
13.231.222.146 attackbotsspam
Sep 15 07:38:18 ns382633 sshd\[9236\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.231.222.146  user=root
Sep 15 07:38:20 ns382633 sshd\[9236\]: Failed password for root from 13.231.222.146 port 58300 ssh2
Sep 15 07:56:04 ns382633 sshd\[12923\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.231.222.146  user=root
Sep 15 07:56:06 ns382633 sshd\[12923\]: Failed password for root from 13.231.222.146 port 37044 ssh2
Sep 15 08:05:20 ns382633 sshd\[14887\]: Invalid user arma3server from 13.231.222.146 port 56632
Sep 15 08:05:20 ns382633 sshd\[14887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.231.222.146
2020-09-15 16:07:41

Recently Reported IPs

213.172.164.77 59.46.234.167 205.20.240.157 217.112.97.248
215.41.134.55 83.161.252.2 129.36.83.150 2.219.98.70
182.131.218.120 108.98.50.179 153.228.183.96 157.211.133.13
86.33.39.27 235.83.145.206 171.207.71.126 189.20.40.11
246.154.19.111 46.136.50.220 93.119.44.103 26.120.145.224