Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Medina

Region: Medina Region

Country: Saudi Arabia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.247.206.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24871
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.247.206.145.		IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051500 1800 900 604800 86400

;; Query time: 74 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 15 17:13:05 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 145.206.247.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.206.247.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
122.176.27.149 attackbotsspam
Sep 20 08:59:55 ny01 sshd[3092]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.27.149
Sep 20 08:59:57 ny01 sshd[3092]: Failed password for invalid user minecraft from 122.176.27.149 port 45156 ssh2
Sep 20 09:05:35 ny01 sshd[4033]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.27.149
2019-09-21 00:24:51
13.234.210.241 attackspam
Sep 20 13:32:47 rpi sshd[665]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.234.210.241 
Sep 20 13:32:49 rpi sshd[665]: Failed password for invalid user prueba2 from 13.234.210.241 port 42496 ssh2
2019-09-20 23:53:06
159.203.179.230 attackspam
Sep 20 14:15:54 core sshd[15383]: Invalid user david from 159.203.179.230 port 46080
Sep 20 14:15:56 core sshd[15383]: Failed password for invalid user david from 159.203.179.230 port 46080 ssh2
...
2019-09-20 23:51:04
103.228.112.53 attackbotsspam
Sep 20 11:09:19 tux-35-217 sshd\[16166\]: Invalid user rochelle from 103.228.112.53 port 52358
Sep 20 11:09:19 tux-35-217 sshd\[16166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.112.53
Sep 20 11:09:21 tux-35-217 sshd\[16166\]: Failed password for invalid user rochelle from 103.228.112.53 port 52358 ssh2
Sep 20 11:14:06 tux-35-217 sshd\[16196\]: Invalid user fagan from 103.228.112.53 port 35524
Sep 20 11:14:06 tux-35-217 sshd\[16196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.112.53
...
2019-09-20 23:55:06
213.61.167.88 attack
Sep 20 13:27:48 localhost sshd\[2794\]: Invalid user liza from 213.61.167.88 port 16134
Sep 20 13:27:48 localhost sshd\[2794\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.61.167.88
Sep 20 13:27:50 localhost sshd\[2794\]: Failed password for invalid user liza from 213.61.167.88 port 16134 ssh2
...
2019-09-21 00:03:25
5.39.163.224 attackbotsspam
2019-09-20T22:51:07.604965enmeeting.mahidol.ac.th sshd\[24036\]: Invalid user naresh from 5.39.163.224 port 46524
2019-09-20T22:51:07.619531enmeeting.mahidol.ac.th sshd\[24036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=h5-39-163-224.cl.ricentr-isp.ru
2019-09-20T22:51:09.643974enmeeting.mahidol.ac.th sshd\[24036\]: Failed password for invalid user naresh from 5.39.163.224 port 46524 ssh2
...
2019-09-21 00:13:26
165.22.58.247 attackbots
Triggered by Fail2Ban at Vostok web server
2019-09-20 23:44:23
220.98.84.31 attack
Sep 20 12:18:15 root sshd[7074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.98.84.31 
Sep 20 12:18:17 root sshd[7074]: Failed password for invalid user zhu from 220.98.84.31 port 61174 ssh2
Sep 20 12:28:52 root sshd[7173]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.98.84.31 
...
2019-09-21 00:02:29
45.136.109.34 attack
firewall-block, port(s): 3009/tcp, 3037/tcp, 3052/tcp, 3054/tcp, 3090/tcp, 3118/tcp, 3120/tcp, 3213/tcp, 3382/tcp, 3413/tcp, 3545/tcp, 3561/tcp, 3659/tcp, 3789/tcp, 3827/tcp, 3839/tcp, 3908/tcp, 3923/tcp, 3948/tcp, 3951/tcp, 3954/tcp, 3957/tcp, 3963/tcp
2019-09-21 00:24:02
202.84.45.250 attackspambots
Sep 20 17:37:29 v22018053744266470 sshd[4978]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.84.45.250
Sep 20 17:37:30 v22018053744266470 sshd[4978]: Failed password for invalid user appuser from 202.84.45.250 port 35805 ssh2
Sep 20 17:44:25 v22018053744266470 sshd[5458]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.84.45.250
...
2019-09-20 23:46:41
49.88.112.114 attackspambots
Sep 20 00:59:59 tdfoods sshd\[20688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Sep 20 01:00:01 tdfoods sshd\[20688\]: Failed password for root from 49.88.112.114 port 54938 ssh2
Sep 20 01:01:03 tdfoods sshd\[20762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.114  user=root
Sep 20 01:01:04 tdfoods sshd\[20762\]: Failed password for root from 49.88.112.114 port 32229 ssh2
Sep 20 01:01:07 tdfoods sshd\[20762\]: Failed password for root from 49.88.112.114 port 32229 ssh2
2019-09-21 00:06:57
188.166.246.46 attackbotsspam
Sep 20 17:44:29 OPSO sshd\[11459\]: Invalid user ndaniels from 188.166.246.46 port 51898
Sep 20 17:44:29 OPSO sshd\[11459\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.246.46
Sep 20 17:44:32 OPSO sshd\[11459\]: Failed password for invalid user ndaniels from 188.166.246.46 port 51898 ssh2
Sep 20 17:49:20 OPSO sshd\[12507\]: Invalid user euclide from 188.166.246.46 port 36476
Sep 20 17:49:20 OPSO sshd\[12507\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.246.46
2019-09-20 23:49:36
139.227.112.211 attackspam
Sep 20 11:14:18 MK-Soft-VM4 sshd\[18537\]: Invalid user subhang from 139.227.112.211 port 46080
Sep 20 11:14:18 MK-Soft-VM4 sshd\[18537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.227.112.211
Sep 20 11:14:20 MK-Soft-VM4 sshd\[18537\]: Failed password for invalid user subhang from 139.227.112.211 port 46080 ssh2
...
2019-09-20 23:46:22
188.254.0.197 attackbots
Sep 20 16:11:32 web8 sshd\[10282\]: Invalid user o from 188.254.0.197
Sep 20 16:11:32 web8 sshd\[10282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.197
Sep 20 16:11:34 web8 sshd\[10282\]: Failed password for invalid user o from 188.254.0.197 port 36596 ssh2
Sep 20 16:16:09 web8 sshd\[12579\]: Invalid user kynaa from 188.254.0.197
Sep 20 16:16:09 web8 sshd\[12579\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.197
2019-09-21 00:26:30
222.186.52.89 attackbotsspam
SSH Brute Force, server-1 sshd[31794]: Failed password for root from 222.186.52.89 port 58200 ssh2
2019-09-20 23:50:40

Recently Reported IPs

149.5.168.157 224.191.185.44 170.77.157.149 176.236.16.122
77.123.60.95 110.71.244.13 202.127.145.29 69.124.66.154
206.143.143.28 33.39.221.24 50.124.37.8 38.28.55.168
104.196.235.71 107.0.151.245 110.214.90.226 135.121.123.73
119.149.160.70 41.3.87.115 178.187.48.83 151.106.84.225