Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.253.179.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20374
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.253.179.135.		IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:06:05 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 135.179.253.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.179.253.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
189.213.149.54 attackspam
Automatic report - Port Scan Attack
2020-09-03 16:22:38
198.12.84.221 attackbotsspam
Sep  3 08:58:40 minden010 sshd[26933]: Failed password for root from 198.12.84.221 port 52122 ssh2
Sep  3 09:00:25 minden010 sshd[27428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.12.84.221
Sep  3 09:00:27 minden010 sshd[27428]: Failed password for invalid user dice from 198.12.84.221 port 51454 ssh2
...
2020-09-03 16:47:21
24.31.141.43 attack
(sshd) Failed SSH login from 24.31.141.43 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep  2 12:44:12 server4 sshd[24731]: Invalid user admin from 24.31.141.43
Sep  2 12:44:14 server4 sshd[24731]: Failed password for invalid user admin from 24.31.141.43 port 46319 ssh2
Sep  2 12:44:15 server4 sshd[24777]: Invalid user admin from 24.31.141.43
Sep  2 12:44:17 server4 sshd[24777]: Failed password for invalid user admin from 24.31.141.43 port 46400 ssh2
Sep  2 12:44:17 server4 sshd[24822]: Invalid user admin from 24.31.141.43
2020-09-03 16:50:50
122.51.60.39 attack
Invalid user qlz from 122.51.60.39 port 55462
2020-09-03 16:21:26
2400:6180:0:d0::ece:3001 attack
xmlrpc attack
2020-09-03 16:23:38
185.123.164.52 attackbots
Sep  3 10:03:55 haigwepa sshd[2908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.123.164.52 
Sep  3 10:03:57 haigwepa sshd[2908]: Failed password for invalid user eric from 185.123.164.52 port 51092 ssh2
...
2020-09-03 16:21:06
185.220.103.8 attackbotsspam
Tried sshing with brute force.
2020-09-03 16:52:30
112.85.42.194 attack
Sep  3 10:19:31 melroy-server sshd[23530]: Failed password for root from 112.85.42.194 port 12611 ssh2
Sep  3 10:19:35 melroy-server sshd[23530]: Failed password for root from 112.85.42.194 port 12611 ssh2
...
2020-09-03 17:05:42
122.152.220.161 attackbotsspam
$f2bV_matches
2020-09-03 16:43:18
139.59.211.245 attackbotsspam
Invalid user msq from 139.59.211.245 port 40038
2020-09-03 16:31:27
178.128.51.162 attackbots
178.128.51.162 - - [03/Sep/2020:08:30:53 +0200] "GET /wp-login.php HTTP/1.1" 200 9040 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.51.162 - - [03/Sep/2020:08:31:00 +0200] "POST /wp-login.php HTTP/1.1" 200 9291 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.51.162 - - [03/Sep/2020:08:31:01 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-09-03 16:50:32
50.62.208.86 attackspam
Automatic report - Banned IP Access
2020-09-03 16:23:14
13.127.58.123 attackbots
reported through recidive - multiple failed attempts(SSH)
2020-09-03 17:04:16
123.207.10.199 attackbotsspam
Invalid user oracle from 123.207.10.199 port 47638
2020-09-03 17:02:58
112.172.147.34 attack
Invalid user wangqiang from 112.172.147.34 port 11471
2020-09-03 16:18:38

Recently Reported IPs

185.63.35.145 84.107.12.165 215.54.101.131 29.75.107.90
80.74.126.29 145.193.123.16 162.154.226.159 206.218.224.231
131.44.65.178 63.5.63.160 114.189.167.129 75.41.28.69
135.179.255.212 121.92.198.255 128.110.36.108 194.8.214.73
69.90.111.172 165.53.244.97 137.238.209.38 143.91.48.144