Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.34.77.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56165
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.34.77.47.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:03:07 CST 2022
;; MSG SIZE  rcvd: 105
Host info
47.77.34.142.in-addr.arpa domain name pointer emergencyinfobc.ca.
47.77.34.142.in-addr.arpa domain name pointer engage.gov.bc.ca.
47.77.34.142.in-addr.arpa domain name pointer forms.gov.bc.ca.
47.77.34.142.in-addr.arpa domain name pointer fosteringconnections.ca.
47.77.34.142.in-addr.arpa domain name pointer fosternow.gov.bc.ca.
47.77.34.142.in-addr.arpa domain name pointer goelectricbc.gov.bc.ca.
47.77.34.142.in-addr.arpa domain name pointer greatbearrainforest.gov.bc.ca.
47.77.34.142.in-addr.arpa domain name pointer housingaction.gov.bc.ca.
47.77.34.142.in-addr.arpa domain name pointer housingaffordability.gov.bc.ca.
47.77.34.142.in-addr.arpa domain name pointer iiobc.ca.
47.77.34.142.in-addr.arpa domain name pointer justicebc.ca.
47.77.34.142.in-addr.arpa domain name pointer justicebc.com.
47.77.34.142.in-addr.arpa domain name pointer lnginbc.gov.bc.ca.
47.77.34.142.in-addr.arpa domain name pointer masseytunnel.ca.
47.77.34.142.in-addr.arpa domain name pointer ocioconnect.gov.bc.ca.
47.77.34.142.in-addr.ar
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
47.77.34.142.in-addr.arpa	name = iiobc.ca.
47.77.34.142.in-addr.arpa	name = justicebc.ca.
47.77.34.142.in-addr.arpa	name = justicebc.com.
47.77.34.142.in-addr.arpa	name = lnginbc.gov.bc.ca.
47.77.34.142.in-addr.arpa	name = masseytunnel.ca.
47.77.34.142.in-addr.arpa	name = ocioconnect.gov.bc.ca.
47.77.34.142.in-addr.arpa	name = orderofbc.gov.bc.ca.
47.77.34.142.in-addr.arpa	name = professionalgovernancebc.ca.
47.77.34.142.in-addr.arpa	name = renters.gov.bc.ca.
47.77.34.142.in-addr.arpa	name = seniorsadvocatebc.ca.
47.77.34.142.in-addr.arpa	name = socialmediatoolkit.gov.bc.ca.
47.77.34.142.in-addr.arpa	name = spills.gov.bc.ca.
47.77.34.142.in-addr.arpa	name = thronespeech.gov.bc.ca.
47.77.34.142.in-addr.arpa	name = upgradebc.ca.
47.77.34.142.in-addr.arpa	name = workingforyou.gov.bc.ca.
47.77.34.142.in-addr.arpa	name = www.aglg.ca.
47.77.34.142.in-addr.arpa	name = www.bcforhighschool.gov.bc.ca.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
77.75.77.11 attack
Automatic report - Banned IP Access
2019-07-24 15:23:35
159.65.148.115 attackspam
Jul 24 09:13:56 SilenceServices sshd[11938]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.148.115
Jul 24 09:13:59 SilenceServices sshd[11938]: Failed password for invalid user scanner from 159.65.148.115 port 54308 ssh2
Jul 24 09:20:44 SilenceServices sshd[16881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.148.115
2019-07-24 15:24:00
212.45.1.194 attackbotsspam
Invalid user hadoop from 212.45.1.194 port 49198
2019-07-24 15:40:24
196.1.99.12 attackspam
Invalid user postgres from 196.1.99.12 port 45324
2019-07-24 15:42:08
185.110.186.41 attackspam
Invalid user redis from 185.110.186.41 port 54788
2019-07-24 15:50:45
216.218.134.12 attackbots
Invalid user 666666 from 216.218.134.12 port 43021
2019-07-24 15:39:47
195.223.54.18 attackspambots
Invalid user linker from 195.223.54.18 port 27103
2019-07-24 15:42:33
5.39.92.185 attackbots
Jul 24 01:38:12 aat-srv002 sshd[2546]: Failed password for root from 5.39.92.185 port 60091 ssh2
Jul 24 01:43:14 aat-srv002 sshd[2702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.92.185
Jul 24 01:43:16 aat-srv002 sshd[2702]: Failed password for invalid user mycat from 5.39.92.185 port 57663 ssh2
...
2019-07-24 15:08:09
185.244.25.87 attackspambots
Invalid user telnet from 185.244.25.87 port 52644
2019-07-24 15:48:11
139.59.56.121 attackbots
Invalid user postgres from 139.59.56.121 port 36412
2019-07-24 15:32:53
173.193.179.253 attackbots
Jul 24 02:29:09 vps200512 sshd\[18463\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.193.179.253  user=root
Jul 24 02:29:11 vps200512 sshd\[18463\]: Failed password for root from 173.193.179.253 port 52982 ssh2
Jul 24 02:33:52 vps200512 sshd\[18538\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.193.179.253  user=root
Jul 24 02:33:54 vps200512 sshd\[18538\]: Failed password for root from 173.193.179.253 port 49668 ssh2
Jul 24 02:38:35 vps200512 sshd\[18574\]: Invalid user stefan from 173.193.179.253
2019-07-24 14:58:56
206.189.33.131 attack
Jul 24 08:34:27 nextcloud sshd\[5423\]: Invalid user maint from 206.189.33.131
Jul 24 08:34:27 nextcloud sshd\[5423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.33.131
Jul 24 08:34:29 nextcloud sshd\[5423\]: Failed password for invalid user maint from 206.189.33.131 port 32898 ssh2
...
2019-07-24 15:22:35
193.70.33.75 attackbotsspam
Invalid user service from 193.70.33.75 port 47556
2019-07-24 15:44:44
188.166.247.82 attackspambots
Jul 24 09:17:24 h2177944 sshd\[22721\]: Invalid user admin from 188.166.247.82 port 59212
Jul 24 09:17:24 h2177944 sshd\[22721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.247.82
Jul 24 09:17:27 h2177944 sshd\[22721\]: Failed password for invalid user admin from 188.166.247.82 port 59212 ssh2
Jul 24 09:23:38 h2177944 sshd\[22811\]: Invalid user webuser from 188.166.247.82 port 55248
Jul 24 09:23:38 h2177944 sshd\[22811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.247.82
...
2019-07-24 15:33:21
92.223.159.3 attack
Jul 24 09:57:45 yabzik sshd[5323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.223.159.3
Jul 24 09:57:47 yabzik sshd[5323]: Failed password for invalid user ubuntu from 92.223.159.3 port 47840 ssh2
Jul 24 10:02:29 yabzik sshd[6914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.223.159.3
2019-07-24 15:13:24

Recently Reported IPs

142.34.249.27 8.81.215.116 142.4.0.106 142.4.0.166
142.4.0.161 142.4.0.117 142.35.186.204 142.4.0.220
142.4.0.99 142.4.1.14 142.4.0.174 142.4.1.197
142.4.10.113 142.4.110.149 142.4.112.181 142.4.107.60
142.4.117.58 142.4.12.104 142.4.12.107 142.4.1.89