Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Victoria

Region: British Columbia

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.35.164.126
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51537
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.35.164.126.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121902 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 20 06:44:30 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 126.164.35.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 126.164.35.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.134.179.102 attack
SmallBizIT.US 3 packets to tcp(3654,4418,30010)
2020-05-23 18:22:25
37.49.226.40 attackspam
May 23 11:36:23 debian-2gb-nbg1-2 kernel: \[12485396.431547\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=37.49.226.40 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=5688 PROTO=TCP SPT=57952 DPT=5038 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-23 18:26:08
218.94.125.234 attack
$f2bV_matches
2020-05-23 18:34:38
5.135.185.27 attackbots
Invalid user vho from 5.135.185.27 port 41488
2020-05-23 18:31:42
211.159.153.62 attackbots
2020-05-22 UTC: (12x) - cwe,hwu,jrx,jwi,jyzhu,qnc,tja,wtj,xnh,ydj,yongren,zhd
2020-05-23 18:35:36
59.125.61.102 attackspam
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 18:14:30
35.224.121.138 attackspam
Invalid user scd from 35.224.121.138 port 50354
2020-05-23 18:28:57
200.129.242.4 attackbots
(sshd) Failed SSH login from 200.129.242.4 (BR/Brazil/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 23 12:23:40 ubnt-55d23 sshd[13509]: Invalid user jrp from 200.129.242.4 port 30655
May 23 12:23:42 ubnt-55d23 sshd[13509]: Failed password for invalid user jrp from 200.129.242.4 port 30655 ssh2
2020-05-23 18:37:54
80.82.70.194 attack
SmallBizIT.US 5 packets to tcp(9175,9277,9430,9668,9794)
2020-05-23 18:06:31
45.40.253.179 attack
May 23 07:13:30 vps sshd[31754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.253.179 
May 23 07:13:32 vps sshd[31754]: Failed password for invalid user bpadmin from 45.40.253.179 port 54356 ssh2
May 23 07:19:01 vps sshd[32002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.40.253.179 
...
2020-05-23 18:22:50
80.82.77.245 attack
SmallBizIT.US 3 packets to udp(53,68,120)
2020-05-23 18:05:59
45.138.111.170 attackspambots
Invalid user uym from 45.138.111.170 port 58146
2020-05-23 18:21:58
41.216.186.187 attackbots
05/23/2020-01:19:25.992498 41.216.186.187 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-23 18:24:46
47.133.167.11 attackspambots
SmallBizIT.US 1 packets to tcp(23)
2020-05-23 18:18:46
92.53.65.52 attack
Port scan: Attack repeated for 24 hours
2020-05-23 18:00:50

Recently Reported IPs

205.246.184.81 64.105.230.85 209.203.55.224 239.64.36.24
44.59.241.92 23.40.104.87 115.190.147.189 246.197.242.12
209.99.170.6 227.204.32.241 139.166.205.61 72.4.51.63
198.57.3.46 107.123.83.59 6.207.233.47 200.201.149.116
149.21.154.137 229.140.178.99 165.20.29.233 57.68.207.51