Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.26.140.41
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12252
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.26.140.41.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 16:33:05 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 41.140.26.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 41.140.26.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.37.39.52 attack
Honeypot attack, port: 445, PTR: 52.39.37.58.broad.xw.sh.dynamic.163data.com.cn.
2019-12-24 16:25:16
54.36.148.62 attackspam
Automatic report - Banned IP Access
2019-12-24 16:39:18
61.177.172.128 attackspam
2019-12-24T08:14:51.443789abusebot-4.cloudsearch.cf sshd[15943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
2019-12-24T08:14:53.422624abusebot-4.cloudsearch.cf sshd[15943]: Failed password for root from 61.177.172.128 port 38293 ssh2
2019-12-24T08:14:56.402841abusebot-4.cloudsearch.cf sshd[15943]: Failed password for root from 61.177.172.128 port 38293 ssh2
2019-12-24T08:14:51.443789abusebot-4.cloudsearch.cf sshd[15943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.128  user=root
2019-12-24T08:14:53.422624abusebot-4.cloudsearch.cf sshd[15943]: Failed password for root from 61.177.172.128 port 38293 ssh2
2019-12-24T08:14:56.402841abusebot-4.cloudsearch.cf sshd[15943]: Failed password for root from 61.177.172.128 port 38293 ssh2
2019-12-24T08:14:51.443789abusebot-4.cloudsearch.cf sshd[15943]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ss
...
2019-12-24 16:16:35
176.31.182.125 attackspam
Dec 24 10:11:53 server sshd\[30302\]: Invalid user gassmann from 176.31.182.125
Dec 24 10:11:53 server sshd\[30302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.125 
Dec 24 10:11:55 server sshd\[30302\]: Failed password for invalid user gassmann from 176.31.182.125 port 37389 ssh2
Dec 24 10:20:02 server sshd\[32179\]: Invalid user casnji from 176.31.182.125
Dec 24 10:20:02 server sshd\[32179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.182.125 
...
2019-12-24 16:18:14
142.93.113.182 attack
Automatic report - Banned IP Access
2019-12-24 16:10:23
143.107.154.55 attackbotsspam
Dec 24 07:48:31 zeus sshd[24774]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=143.107.154.55 
Dec 24 07:48:33 zeus sshd[24774]: Failed password for invalid user ie from 143.107.154.55 port 33263 ssh2
Dec 24 07:52:39 zeus sshd[24884]: Failed password for root from 143.107.154.55 port 49789 ssh2
2019-12-24 16:09:45
92.118.38.39 attack
Dec 24 09:34:43 webserver postfix/smtpd\[5149\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 09:35:15 webserver postfix/smtpd\[3126\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 09:35:47 webserver postfix/smtpd\[5149\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 09:36:19 webserver postfix/smtpd\[4480\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 24 09:36:51 webserver postfix/smtpd\[3126\]: warning: unknown\[92.118.38.39\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-24 16:36:24
134.175.41.71 attackbotsspam
Dec 24 07:16:23 pi sshd\[14863\]: Invalid user wrobel from 134.175.41.71 port 49514
Dec 24 07:16:23 pi sshd\[14863\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.41.71
Dec 24 07:16:25 pi sshd\[14863\]: Failed password for invalid user wrobel from 134.175.41.71 port 49514 ssh2
Dec 24 07:20:06 pi sshd\[14926\]: Invalid user service from 134.175.41.71 port 52240
Dec 24 07:20:06 pi sshd\[14926\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.41.71
...
2019-12-24 16:12:17
81.182.254.124 attackspambots
Dec 24 08:08:10 xeon sshd[969]: Failed password for root from 81.182.254.124 port 47460 ssh2
2019-12-24 16:19:54
177.206.144.210 attack
Honeypot attack, port: 23, PTR: 177.206.144.210.dynamic.adsl.gvt.net.br.
2019-12-24 16:37:55
182.73.208.249 attackbots
Unauthorized connection attempt detected from IP address 182.73.208.249 to port 445
2019-12-24 16:14:26
212.26.251.94 attackbots
Unauthorized connection attempt from IP address 212.26.251.94 on Port 445(SMB)
2019-12-24 16:41:41
120.132.124.237 attackbots
Invalid user user7 from 120.132.124.237 port 50748
2019-12-24 16:15:57
122.152.250.89 attackbots
Dec 24 07:17:32 raspberrypi sshd\[21158\]: Invalid user guitar from 122.152.250.89Dec 24 07:17:34 raspberrypi sshd\[21158\]: Failed password for invalid user guitar from 122.152.250.89 port 51046 ssh2Dec 24 07:36:49 raspberrypi sshd\[22548\]: Invalid user paris5 from 122.152.250.89
...
2019-12-24 16:42:15
14.171.202.156 attackbotsspam
Attempt to attack host OS, exploiting network vulnerabilities, on 24-12-2019 07:20:10.
2019-12-24 16:05:46

Recently Reported IPs

193.111.206.223 176.45.84.254 81.26.216.7 85.5.251.137
68.36.89.4 227.18.129.3 16.224.224.205 103.206.168.148
165.20.21.204 160.234.143.139 200.254.63.158 44.148.126.190
142.86.50.61 231.30.182.208 95.103.152.94 12.131.28.96
194.63.226.70 67.183.191.221 6.24.59.9 53.162.146.215