Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.250.109.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.250.109.145.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:37:41 CST 2025
;; MSG SIZE  rcvd: 108
Host info
145.109.250.142.in-addr.arpa domain name pointer zr-in-f145.1e100.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.109.250.142.in-addr.arpa	name = zr-in-f145.1e100.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.177.173.208 attack
Dec 28 06:02:36 goofy sshd\[22572\]: Invalid user spike from 94.177.173.208
Dec 28 06:02:36 goofy sshd\[22572\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.173.208
Dec 28 06:02:38 goofy sshd\[22572\]: Failed password for invalid user spike from 94.177.173.208 port 54165 ssh2
Dec 28 06:24:58 goofy sshd\[23788\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.177.173.208  user=root
Dec 28 06:25:00 goofy sshd\[23788\]: Failed password for root from 94.177.173.208 port 43590 ssh2
2019-12-28 18:22:56
200.194.53.67 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-28 18:02:24
180.249.202.107 attackspam
Unauthorized connection attempt from IP address 180.249.202.107 on Port 445(SMB)
2019-12-28 18:27:38
23.228.73.176 attackbots
RBL Listed IP. Trying to send SPAM.
2019-12-28 18:01:06
189.7.17.61 attackbotsspam
Dec 27 23:04:43 web1 sshd\[13575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.17.61  user=root
Dec 27 23:04:45 web1 sshd\[13575\]: Failed password for root from 189.7.17.61 port 44455 ssh2
Dec 27 23:12:22 web1 sshd\[14341\]: Invalid user bartolomei from 189.7.17.61
Dec 27 23:12:22 web1 sshd\[14341\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.17.61
Dec 27 23:12:24 web1 sshd\[14341\]: Failed password for invalid user bartolomei from 189.7.17.61 port 55377 ssh2
2019-12-28 18:10:07
45.33.19.168 attackbotsspam
Dec 28 10:18:44 debian-2gb-nbg1-2 kernel: \[1177443.401475\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=45.33.19.168 DST=195.201.40.59 LEN=28 TOS=0x00 PREC=0x00 TTL=241 ID=27200 PROTO=UDP SPT=48412 DPT=17554 LEN=8
2019-12-28 18:17:19
185.99.125.184 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-28 18:36:54
87.103.214.196 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-12-28 18:11:46
42.157.192.132 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-12-28 18:07:50
181.98.19.3 attackspam
19/12/28@01:24:38: FAIL: IoT-Telnet address from=181.98.19.3
...
2019-12-28 18:36:17
132.232.43.115 attackbots
Dec 28 06:22:33 localhost sshd\[127080\]: Invalid user freehunter from 132.232.43.115 port 57716
Dec 28 06:22:33 localhost sshd\[127080\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.43.115
Dec 28 06:22:36 localhost sshd\[127080\]: Failed password for invalid user freehunter from 132.232.43.115 port 57716 ssh2
Dec 28 06:25:33 localhost sshd\[127351\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.43.115  user=root
Dec 28 06:25:35 localhost sshd\[127351\]: Failed password for root from 132.232.43.115 port 50922 ssh2
...
2019-12-28 18:00:52
200.78.187.5 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-28 18:00:13
159.203.201.32 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-28 18:16:47
185.86.164.104 attackbots
Joomla Admin : try to force the door...
2019-12-28 18:35:00
170.254.229.178 attackbotsspam
Dec 28 07:06:17 localhost sshd[51425]: Failed password for invalid user flett from 170.254.229.178 port 50800 ssh2
Dec 28 07:22:07 localhost sshd[52358]: Failed password for invalid user midnight from 170.254.229.178 port 59026 ssh2
Dec 28 07:25:12 localhost sshd[52479]: Failed password for invalid user vallance from 170.254.229.178 port 59746 ssh2
2019-12-28 18:12:50

Recently Reported IPs

9.146.137.231 249.149.61.15 194.15.76.152 135.3.136.253
3.106.155.158 184.158.203.102 34.140.59.204 79.206.112.131
199.195.152.112 14.8.194.63 33.109.133.0 30.161.10.99
97.100.8.117 7.4.197.150 32.113.103.98 191.23.201.130
176.130.203.141 59.109.103.140 24.129.143.114 5.103.159.151