Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.254.18.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3194
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.254.18.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011001 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 11:57:59 CST 2025
;; MSG SIZE  rcvd: 107
Host info
164.18.254.142.in-addr.arpa domain name pointer 142-254-18-164.dsl.dynamic.fusionbroadband.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
164.18.254.142.in-addr.arpa	name = 142-254-18-164.dsl.dynamic.fusionbroadband.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
118.163.45.178 attackspam
Port 623 scan denied
2020-03-28 19:26:10
45.143.220.251 attack
Port 43859 scan denied
2020-03-28 18:55:50
117.50.63.253 attackspam
firewall-block, port(s): 4567/tcp
2020-03-28 19:26:29
87.251.74.13 attack
03/28/2020-02:48:02.854549 87.251.74.13 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-28 18:42:45
74.82.47.8 attack
" "
2020-03-28 19:36:55
185.164.72.47 attack
Port 3389 (MS RDP) access denied
2020-03-28 19:11:35
185.176.221.238 attackbotsspam
56 packets to ports 1189 2289 3339 4489 5589 6689 7789 8889 9989 11111 22222 33333 44444 55555
2020-03-28 19:10:36
176.113.115.43 attackspam
ET DROP Dshield Block Listed Source group 1 - port: 3388 proto: TCP cat: Misc Attack
2020-03-28 19:16:06
92.63.196.7 attack
TCP scanned port list, 3402, 3399, 3400, 3398
2020-03-28 18:40:05
46.101.197.111 attackbotsspam
Unauthorized connection attempt detected from IP address 46.101.197.111 to port 5910
2020-03-28 18:54:09
192.241.239.84 attackbots
Port 50011 scan denied
2020-03-28 19:07:54
157.230.31.236 attackbots
Port 8965 scan denied
2020-03-28 19:22:17
45.227.254.30 attack
Port 8888 scan denied
2020-03-28 18:55:16
185.200.118.47 attackbots
Port 1723 scan denied
2020-03-28 19:09:49
91.212.38.210 attackspambots
91.212.38.210 was recorded 7 times by 5 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 7, 18, 359
2020-03-28 18:40:24

Recently Reported IPs

128.167.27.128 32.82.110.132 154.78.101.93 176.140.180.3
116.217.172.204 231.204.152.113 170.14.187.72 23.209.221.39
195.90.81.128 47.208.142.155 216.91.101.191 138.251.131.92
255.71.171.109 29.206.2.231 20.84.105.88 141.124.81.61
125.248.171.181 123.11.154.227 74.151.52.162 150.63.63.134