Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.30.178.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.30.178.75.			IN	A

;; AUTHORITY SECTION:
.			588	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:22:07 CST 2022
;; MSG SIZE  rcvd: 106
Host info
75.178.30.142.in-addr.arpa domain name pointer nvsd44.bc.ca.
75.178.30.142.in-addr.arpa domain name pointer sd44.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
75.178.30.142.in-addr.arpa	name = nvsd44.bc.ca.
75.178.30.142.in-addr.arpa	name = sd44.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
213.76.172.24 attack
2019-09-12 x@x
2019-09-12 x@x
2019-09-12 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.76.172.24
2019-09-13 06:03:23
67.207.95.247 attackspam
Sep 12 16:31:21 lvps5-35-247-183 sshd[13879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.95.247  user=r.r
Sep 12 16:31:23 lvps5-35-247-183 sshd[13879]: Failed password for r.r from 67.207.95.247 port 47356 ssh2
Sep 12 16:31:23 lvps5-35-247-183 sshd[13879]: Received disconnect from 67.207.95.247: 11: Bye Bye [preauth]
Sep 12 16:31:24 lvps5-35-247-183 sshd[13882]: Invalid user admin from 67.207.95.247
Sep 12 16:31:24 lvps5-35-247-183 sshd[13882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.207.95.247 
Sep 12 16:31:26 lvps5-35-247-183 sshd[13882]: Failed password for invalid user admin from 67.207.95.247 port 50662 ssh2
Sep 12 16:31:26 lvps5-35-247-183 sshd[13882]: Received disconnect from 67.207.95.247: 11: Bye Bye [preauth]
Sep 12 16:31:27 lvps5-35-247-183 sshd[13884]: Invalid user admin from 67.207.95.247
Sep 12 16:31:27 lvps5-35-247-183 sshd[13884]: pam_unix(sshd:auth): a........
-------------------------------
2019-09-13 05:53:58
183.82.121.242 attackspambots
Sep 12 23:30:53 lnxded63 sshd[20931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.82.121.242
2019-09-13 06:02:31
159.203.197.24 attack
Unauthorized connection attempt from IP address 159.203.197.24 on Port 139(NETBIOS)
2019-09-13 06:42:50
51.91.38.180 attackbotsspam
$f2bV_matches
2019-09-13 06:14:21
51.83.73.160 attackbotsspam
Automatic report - Banned IP Access
2019-09-13 05:54:48
35.240.217.103 attackbots
Automated report - ssh fail2ban:
Sep 12 23:44:57 authentication failure 
Sep 12 23:45:00 wrong password, user=csserver, port=41044, ssh2
Sep 12 23:51:27 authentication failure
2019-09-13 06:39:13
112.85.42.89 attackspambots
Sep 13 01:19:34 server sshd\[31376\]: User root from 112.85.42.89 not allowed because listed in DenyUsers
Sep 13 01:19:34 server sshd\[31376\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Sep 13 01:19:35 server sshd\[31766\]: User root from 112.85.42.89 not allowed because listed in DenyUsers
Sep 13 01:19:36 server sshd\[31766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.89  user=root
Sep 13 01:19:37 server sshd\[31376\]: Failed password for invalid user root from 112.85.42.89 port 13126 ssh2
2019-09-13 06:22:18
114.236.78.22 attack
Sep 12 16:31:17 xxxxxxx0 sshd[23272]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.236.78.22  user=r.r
Sep 12 16:31:19 xxxxxxx0 sshd[23272]: Failed password for r.r from 114.236.78.22 port 52824 ssh2
Sep 12 16:31:22 xxxxxxx0 sshd[23272]: Failed password for r.r from 114.236.78.22 port 52824 ssh2
Sep 12 16:31:24 xxxxxxx0 sshd[23272]: Failed password for r.r from 114.236.78.22 port 52824 ssh2
Sep 12 16:31:26 xxxxxxx0 sshd[23272]: Failed password for r.r from 114.236.78.22 port 52824 ssh2

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=114.236.78.22
2019-09-13 06:01:35
218.161.75.17 attackspam
81/tcp
[2019-09-12]1pkt
2019-09-13 06:31:34
121.121.86.184 attack
19/9/12@10:46:32: FAIL: IoT-Telnet address from=121.121.86.184
...
2019-09-13 06:07:20
165.22.22.158 attack
Sep 12 23:06:41 dev0-dcde-rnet sshd[1151]: Failed password for root from 165.22.22.158 port 37546 ssh2
Sep 12 23:12:26 dev0-dcde-rnet sshd[1203]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.22.158
Sep 12 23:12:28 dev0-dcde-rnet sshd[1203]: Failed password for invalid user git from 165.22.22.158 port 47886 ssh2
2019-09-13 05:56:40
185.59.143.170 attackspam
[portscan] Port scan
2019-09-13 06:19:50
178.151.237.239 attack
SMB Server BruteForce Attack
2019-09-13 06:04:55
220.176.212.116 attackbotsspam
SSH/22 MH Probe, BF, Hack -
2019-09-13 06:35:08

Recently Reported IPs

142.255.40.25 142.34.133.56 142.31.193.73 142.34.150.209
142.34.139.53 142.34.200.45 142.34.208.155 142.34.212.47
142.34.213.59 142.34.213.107 142.34.225.192 142.4.0.156
142.36.155.24 142.4.1.183 142.4.1.19 142.4.113.35
142.4.102.49 142.4.101.17 142.4.10.87 142.4.1.28