Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.214.241.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4001
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.214.241.13.			IN	A

;; AUTHORITY SECTION:
.			592	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 19:28:20 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'Host 13.241.214.142.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 142.214.241.13.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
46.8.113.96 attack
8080/tcp 8080/tcp
[2020-04-12/05-01]2pkt
2020-05-01 22:21:03
122.116.13.131 attack
23/tcp 23/tcp 23/tcp
[2020-04-14/05-01]3pkt
2020-05-01 22:24:37
211.103.213.45 attack
1433/tcp 1433/tcp 1433/tcp...
[2020-03-02/05-01]5pkt,1pt.(tcp)
2020-05-01 22:28:19
39.115.133.87 attackspambots
IP was detected trying to Brute-Force SSH, FTP, Web Apps, Port-Scan or Hacking.
2020-05-01 22:28:55
106.37.72.121 attackspam
Brute force attempt
2020-05-01 22:00:58
92.118.160.5 attackspam
Port scan: Attack repeated for 24 hours
2020-05-01 22:31:12
119.199.29.166 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-01 22:35:00
149.0.54.123 attackbotsspam
DATE:2020-05-01 13:49:40, IP:149.0.54.123, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-05-01 22:04:01
51.79.68.147 attackspambots
Invalid user local from 51.79.68.147 port 38818
2020-05-01 22:19:01
119.28.116.166 attack
Invalid user edoardo from 119.28.116.166 port 45454
2020-05-01 22:00:25
51.38.231.249 attackbotsspam
May  1 15:55:52 PorscheCustomer sshd[27993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.231.249
May  1 15:55:55 PorscheCustomer sshd[27993]: Failed password for invalid user user from 51.38.231.249 port 42762 ssh2
May  1 16:00:04 PorscheCustomer sshd[28125]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.231.249
...
2020-05-01 22:34:19
218.240.148.203 attack
1433/tcp 1433/tcp 1433/tcp...
[2020-03-15/05-01]4pkt,1pt.(tcp)
2020-05-01 22:32:27
81.26.130.133 attackspam
[Aegis] @ 2019-12-31 12:58:42  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2020-05-01 22:15:19
49.233.186.66 attackspam
2020-05-01T11:49:29.683239randservbullet-proofcloud-66.localdomain sshd[10839]: Invalid user studenti from 49.233.186.66 port 35831
2020-05-01T11:49:29.687209randservbullet-proofcloud-66.localdomain sshd[10839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.186.66
2020-05-01T11:49:29.683239randservbullet-proofcloud-66.localdomain sshd[10839]: Invalid user studenti from 49.233.186.66 port 35831
2020-05-01T11:49:31.683662randservbullet-proofcloud-66.localdomain sshd[10839]: Failed password for invalid user studenti from 49.233.186.66 port 35831 ssh2
...
2020-05-01 22:20:45
59.24.104.209 attackspambots
23/tcp 23/tcp 23/tcp...
[2020-04-18/05-01]7pkt,1pt.(tcp)
2020-05-01 22:03:16

Recently Reported IPs

170.233.108.185 23.120.128.221 82.145.215.166 30.201.208.67
103.93.126.29 158.187.224.0 162.182.11.249 77.186.162.86
28.212.144.1 241.241.150.65 232.163.195.158 62.97.192.110
116.1.203.120 233.209.34.30 21.147.53.75 146.182.75.112
140.180.153.232 183.2.229.142 211.113.156.204 205.248.97.155