Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.252.198.166
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17962
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.252.198.166.		IN	A

;; AUTHORITY SECTION:
.			242	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:38:37 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 166.198.252.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 142.252.198.166.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
61.177.172.128 attackspam
Sep  4 11:51:53 NPSTNNYC01T sshd[22429]: Failed password for root from 61.177.172.128 port 50948 ssh2
Sep  4 11:52:09 NPSTNNYC01T sshd[22429]: error: maximum authentication attempts exceeded for root from 61.177.172.128 port 50948 ssh2 [preauth]
Sep  4 11:52:18 NPSTNNYC01T sshd[22447]: Failed password for root from 61.177.172.128 port 20332 ssh2
...
2020-09-04 23:59:54
61.177.172.142 attackspam
$f2bV_matches
2020-09-05 00:06:38
91.207.181.144 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-09-05 00:26:36
222.186.173.154 attackbots
Sep  4 18:06:08 v22019038103785759 sshd\[32120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Sep  4 18:06:10 v22019038103785759 sshd\[32120\]: Failed password for root from 222.186.173.154 port 34160 ssh2
Sep  4 18:06:13 v22019038103785759 sshd\[32120\]: Failed password for root from 222.186.173.154 port 34160 ssh2
Sep  4 18:06:16 v22019038103785759 sshd\[32120\]: Failed password for root from 222.186.173.154 port 34160 ssh2
Sep  4 18:06:20 v22019038103785759 sshd\[32120\]: Failed password for root from 222.186.173.154 port 34160 ssh2
...
2020-09-05 00:07:20
86.108.43.243 attack
SMB Server BruteForce Attack
2020-09-05 00:27:44
117.69.154.5 attackspam
Sep  3 19:47:52 srv01 postfix/smtpd\[25076\]: warning: unknown\[117.69.154.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  3 19:51:18 srv01 postfix/smtpd\[308\]: warning: unknown\[117.69.154.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  3 19:54:45 srv01 postfix/smtpd\[775\]: warning: unknown\[117.69.154.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  3 19:54:57 srv01 postfix/smtpd\[775\]: warning: unknown\[117.69.154.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  3 19:55:13 srv01 postfix/smtpd\[775\]: warning: unknown\[117.69.154.5\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-05 00:18:24
63.83.79.154 attack
Lines containing failures of 63.83.79.154
Sep  2 10:42:22 v2hgb postfix/smtpd[24059]: connect from chase.heceemlak.com[63.83.79.154]
Sep x@x
Sep  2 10:42:23 v2hgb postfix/smtpd[24059]: disconnect from chase.heceemlak.com[63.83.79.154] ehlo=1 mail=1 rcpt=0/1 data=0/1 quhostname=1 commands=3/5


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=63.83.79.154
2020-09-04 23:56:06
103.145.13.158 attackspambots
SIPVicious Scanner Detection
2020-09-05 00:16:35
191.96.72.251 attackspam
Sep  2 18:26:20 our-server-hostname postfix/smtpd[803]: connect from unknown[191.96.72.251]
Sep  2 18:26:20 our-server-hostname postfix/smtpd[32675]: connect from unknown[191.96.72.251]
Sep  2 18:26:21 our-server-hostname postfix/smtpd[32766]: connect from unknown[191.96.72.251]
Sep x@x
Sep x@x
Sep  2 18:26:21 our-server-hostname postfix/smtpd[803]: disconnect from unknown[1
.... truncated .... 
 x@x
Sep x@x
Sep x@x
Sep x@x
Sep  2 18:35:11 our-server-hostname postfix/smtpd[1705]: disconnect from unknown[191.96.72.251]
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep  2 18:35:12 our-server-hostname postfix/smtpd[1816]: disconnect from unknown[191.96.72.251]
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep x@x
Sep  2 18:35:14 our-server-hostname postfix/smtpd[402]: disconnect from unknown[191.........
-------------------------------
2020-09-05 00:24:45
179.124.36.196 attackbots
Sep  4 16:31:25 lnxded63 sshd[24757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.124.36.196
2020-09-04 23:53:13
159.89.38.228 attackbots
Sep  4 18:10:43 lnxded64 sshd[12345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.38.228
2020-09-05 00:14:48
197.43.34.141 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-09-04 23:52:56
61.91.57.150 attack
Icarus honeypot on github
2020-09-04 23:57:22
35.188.182.6 attackbotsspam
fail2ban - Attack against Apache (too many 404s)
2020-09-05 00:00:26
185.176.27.174 attack
ET DROP Dshield Block Listed Source group 1 - port: 33391 proto: tcp cat: Misc Attackbytes: 60
2020-09-05 00:08:50

Recently Reported IPs

118.96.28.23 142.252.198.169 142.252.198.170 118.96.29.162
118.96.29.245 118.96.3.254 118.96.30.22 142.252.223.87
142.252.223.68 142.252.223.95 142.252.223.86 142.252.223.93
118.96.30.73 142.252.223.99 142.252.223.98 142.252.223.63
142.252.223.75 142.252.223.66 142.252.223.69 142.252.223.60