Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.34.3.190
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32984
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.34.3.190.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 00:47:56 CST 2025
;; MSG SIZE  rcvd: 105
Host info
190.3.34.142.in-addr.arpa domain name pointer dmz2.haproxystatsstg.hlth.gov.bc.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
190.3.34.142.in-addr.arpa	name = dmz2.haproxystatsstg.hlth.gov.bc.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
87.251.74.170 attack
 TCP (SYN) 87.251.74.170:59971 -> port 11550, len 44
2020-05-12 04:31:24
111.231.54.28 attackbotsspam
Invalid user guest from 111.231.54.28 port 39344
2020-05-12 04:10:24
185.153.208.26 attackbotsspam
May 11 19:46:58 vps sshd[811169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.153.208.26
May 11 19:47:00 vps sshd[811169]: Failed password for invalid user engineering from 185.153.208.26 port 51352 ssh2
May 11 19:50:19 vps sshd[827881]: Invalid user jboss from 185.153.208.26 port 49992
May 11 19:50:19 vps sshd[827881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.153.208.26
May 11 19:50:21 vps sshd[827881]: Failed password for invalid user jboss from 185.153.208.26 port 49992 ssh2
...
2020-05-12 03:58:54
101.95.105.74 attack
Unauthorized connection attempt from IP address 101.95.105.74 on Port 445(SMB)
2020-05-12 04:18:50
106.54.208.123 attackbotsspam
prod11
...
2020-05-12 03:54:23
119.123.153.135 attackspam
Unauthorized connection attempt from IP address 119.123.153.135 on Port 445(SMB)
2020-05-12 03:52:39
111.75.214.18 attackbotsspam
Unauthorized connection attempt from IP address 111.75.214.18 on Port 445(SMB)
2020-05-12 03:57:17
89.248.172.85 attack
firewall-block, port(s): 3739/tcp, 50091/tcp
2020-05-12 04:28:31
180.249.119.202 attackspambots
Automatic report - Port Scan Attack
2020-05-12 04:29:47
185.112.33.149 attackbotsspam
xmlrpc attack
2020-05-12 04:03:37
182.68.235.1 attackbots
Unauthorized connection attempt from IP address 182.68.235.1 on Port 445(SMB)
2020-05-12 04:12:20
222.186.180.130 attack
May 11 21:57:32 vmanager6029 sshd\[31764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
May 11 21:57:33 vmanager6029 sshd\[31762\]: error: PAM: Authentication failure for root from 222.186.180.130
May 11 21:57:34 vmanager6029 sshd\[31765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.130  user=root
2020-05-12 04:06:52
190.223.41.102 attackbots
Unauthorized connection attempt from IP address 190.223.41.102 on Port 445(SMB)
2020-05-12 04:19:44
157.230.10.212 attackbotsspam
May 11 20:04:38 lock-38 sshd[2254882]: Failed password for invalid user admin from 157.230.10.212 port 59646 ssh2
May 11 20:04:38 lock-38 sshd[2254882]: Disconnected from invalid user admin 157.230.10.212 port 59646 [preauth]
May 11 20:12:58 lock-38 sshd[2255152]: Invalid user bnc from 157.230.10.212 port 35594
May 11 20:12:58 lock-38 sshd[2255152]: Invalid user bnc from 157.230.10.212 port 35594
May 11 20:12:58 lock-38 sshd[2255152]: Failed password for invalid user bnc from 157.230.10.212 port 35594 ssh2
...
2020-05-12 04:32:35
43.225.181.48 attack
Invalid user denzel from 43.225.181.48 port 58618
2020-05-12 03:53:27

Recently Reported IPs

81.98.216.189 160.208.200.7 193.63.96.80 17.97.41.218
120.79.238.187 202.205.168.135 108.70.166.131 247.229.78.190
231.66.62.251 233.151.203.234 133.223.221.71 205.229.1.214
234.231.205.124 96.55.192.199 171.127.202.73 72.143.134.169
165.47.244.41 161.62.236.50 8.238.47.158 205.41.8.37