Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.252.223.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30972
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.252.223.138.		IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:02:29 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 138.223.252.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 142.252.223.138.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
37.252.67.76 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2019-12-15 03:29:10
157.230.128.195 attack
firewall-block, port(s): 10546/tcp
2019-12-15 03:54:17
175.182.230.157 attackbots
Dec 15 00:53:23 our-server-hostname postfix/smtpd[24129]: connect from unknown[175.182.230.157]
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x
Dec x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=175.182.230.157
2019-12-15 03:26:02
137.74.26.179 attackbots
Dec 14 17:24:01 srv206 sshd[15085]: Invalid user jorde from 137.74.26.179
...
2019-12-15 03:35:17
181.46.140.207 attackspam
Autoban   181.46.140.207 AUTH/CONNECT
2019-12-15 03:49:54
62.234.156.221 attackbotsspam
Dec 14 17:04:38 localhost sshd[60392]: Failed password for invalid user cauthen from 62.234.156.221 port 37986 ssh2
Dec 14 17:27:53 localhost sshd[60901]: Failed password for invalid user ot from 62.234.156.221 port 60280 ssh2
Dec 14 17:35:35 localhost sshd[61735]: Failed password for invalid user bar from 62.234.156.221 port 54726 ssh2
2019-12-15 03:23:40
159.203.77.51 attackbotsspam
ssh failed login
2019-12-15 03:46:05
119.1.238.156 attackspam
Dec 14 16:13:30 zeus sshd[31539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.1.238.156 
Dec 14 16:13:33 zeus sshd[31539]: Failed password for invalid user Aleksis from 119.1.238.156 port 36384 ssh2
Dec 14 16:20:42 zeus sshd[31792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.1.238.156 
Dec 14 16:20:44 zeus sshd[31792]: Failed password for invalid user wwwadmin from 119.1.238.156 port 58121 ssh2
2019-12-15 03:26:44
181.120.162.30 attack
Unauthorized connection attempt detected from IP address 181.120.162.30 to port 445
2019-12-15 03:20:34
104.248.139.86 attackbots
Dec 14 14:23:22 sanyalnet-awsem3-1 sshd[10843]: Connection from 104.248.139.86 port 54772 on 172.30.0.184 port 22
Dec 14 14:23:23 sanyalnet-awsem3-1 sshd[10843]: Invalid user sinilau from 104.248.139.86
Dec 14 14:23:23 sanyalnet-awsem3-1 sshd[10843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.86 
Dec 14 14:23:25 sanyalnet-awsem3-1 sshd[10843]: Failed password for invalid user sinilau from 104.248.139.86 port 54772 ssh2
Dec 14 14:23:25 sanyalnet-awsem3-1 sshd[10843]: Received disconnect from 104.248.139.86: 11: Bye Bye [preauth]
Dec 14 14:30:11 sanyalnet-awsem3-1 sshd[11039]: Connection from 104.248.139.86 port 58628 on 172.30.0.184 port 22
Dec 14 14:30:12 sanyalnet-awsem3-1 sshd[11039]: Invalid user daniiel from 104.248.139.86
Dec 14 14:30:12 sanyalnet-awsem3-1 sshd[11039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.139.86 


........
-----------------------------------------------
https://www.blockli
2019-12-15 03:16:13
187.18.110.31 attackbotsspam
Automatic report - Port Scan Attack
2019-12-15 03:27:35
106.54.248.54 attack
[ssh] SSH attack
2019-12-15 03:32:42
188.166.251.156 attack
Dec 14 20:26:33 Ubuntu-1404-trusty-64-minimal sshd\[8211\]: Invalid user www from 188.166.251.156
Dec 14 20:26:33 Ubuntu-1404-trusty-64-minimal sshd\[8211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.156
Dec 14 20:26:35 Ubuntu-1404-trusty-64-minimal sshd\[8211\]: Failed password for invalid user www from 188.166.251.156 port 50622 ssh2
Dec 14 20:35:51 Ubuntu-1404-trusty-64-minimal sshd\[18054\]: Invalid user yangj from 188.166.251.156
Dec 14 20:35:51 Ubuntu-1404-trusty-64-minimal sshd\[18054\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.156
2019-12-15 03:42:46
105.247.122.110 attackspam
1576334529 - 12/14/2019 15:42:09 Host: 105.247.122.110/105.247.122.110 Port: 445 TCP Blocked
2019-12-15 03:24:48
193.112.143.141 attackbotsspam
$f2bV_matches
2019-12-15 03:42:28

Recently Reported IPs

142.252.223.184 142.252.223.218 142.252.223.150 142.252.223.44
142.252.223.156 142.252.223.48 142.252.223.4 142.252.223.222
142.252.223.30 142.252.223.72 142.252.223.58 142.252.223.78
142.252.227.2 142.252.223.76 142.252.243.11 142.252.223.96
142.252.26.183 142.252.26.165 142.252.26.11 142.252.26.105