Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.4.16.20 attackspambots
Sep 27 19:07:43 pve1 sshd[15415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.16.20 
Sep 27 19:07:44 pve1 sshd[15415]: Failed password for invalid user s from 142.4.16.20 port 45291 ssh2
...
2020-09-28 01:55:55
142.4.16.20 attackspambots
Sep 27 11:05:09 pve1 sshd[4229]: Failed password for root from 142.4.16.20 port 26901 ssh2
...
2020-09-27 18:00:19
142.4.16.20 attackbots
$f2bV_matches
2020-09-13 21:30:40
142.4.16.20 attack
SSH Invalid Login
2020-09-13 13:26:01
142.4.16.20 attackbots
Sep 12 16:10:06 firewall sshd[21323]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.16.20  user=root
Sep 12 16:10:08 firewall sshd[21323]: Failed password for root from 142.4.16.20 port 46217 ssh2
Sep 12 16:14:01 firewall sshd[21377]: Invalid user diddy from 142.4.16.20
...
2020-09-13 05:10:39
142.4.16.20 attack
2020-09-11T13:00:10.091291mail.thespaminator.com sshd[15466]: Invalid user test1 from 142.4.16.20 port 49469
2020-09-11T13:00:11.848874mail.thespaminator.com sshd[15466]: Failed password for invalid user test1 from 142.4.16.20 port 49469 ssh2
...
2020-09-12 02:53:21
142.4.16.20 attackspam
Sep 11 12:40:49 ns381471 sshd[17868]: Failed password for root from 142.4.16.20 port 41215 ssh2
Sep 11 12:44:55 ns381471 sshd[19160]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.16.20
2020-09-11 18:51:03
142.4.14.247 attackbotsspam
Automatic report - XMLRPC Attack
2020-09-05 21:06:46
142.4.14.247 attackbots
Automatic report - Banned IP Access
2020-09-05 05:31:10
142.4.14.247 attackspam
142.4.14.247 - - [26/Aug/2020:05:54:39 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [26/Aug/2020:05:54:40 +0200] "POST /wp-login.php HTTP/1.1" 200 1811 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [26/Aug/2020:05:54:41 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [26/Aug/2020:05:54:42 +0200] "POST /wp-login.php HTTP/1.1" 200 1799 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [26/Aug/2020:05:54:47 +0200] "GET /wp-login.php HTTP/1.1" 200 1689 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [26/Aug/2020:05:54:53 +0200] "POST /wp-login.php HTTP/1.1" 200 1798 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/6
...
2020-08-26 13:00:28
142.4.16.20 attackspambots
reported through recidive - multiple failed attempts(SSH)
2020-08-17 18:00:18
142.4.16.20 attack
2020-08-11T05:48:03.931129vps773228.ovh.net sshd[2541]: Invalid user Pa$$word_.123 from 142.4.16.20 port 62392
2020-08-11T05:48:03.940410vps773228.ovh.net sshd[2541]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=mail.desu.ninja
2020-08-11T05:48:03.931129vps773228.ovh.net sshd[2541]: Invalid user Pa$$word_.123 from 142.4.16.20 port 62392
2020-08-11T05:48:06.353081vps773228.ovh.net sshd[2541]: Failed password for invalid user Pa$$word_.123 from 142.4.16.20 port 62392 ssh2
2020-08-11T05:51:57.392516vps773228.ovh.net sshd[2582]: Invalid user Delete from 142.4.16.20 port 41730
...
2020-08-11 16:38:47
142.4.14.247 attack
142.4.14.247 - - [08/Aug/2020:14:07:00 +0100] "POST /wp-login.php HTTP/1.1" 200 1801 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [08/Aug/2020:14:07:07 +0100] "POST /wp-login.php HTTP/1.1" 200 1798 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [08/Aug/2020:14:07:07 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-08 23:23:48
142.4.14.247 attackspambots
142.4.14.247 - - [07/Aug/2020:21:27:26 +0100] "POST /wp-login.php HTTP/1.1" 200 1973 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [07/Aug/2020:21:27:30 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.4.14.247 - - [07/Aug/2020:21:27:33 +0100] "POST /wp-login.php HTTP/1.1" 200 1953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-08 05:18:34
142.4.16.20 attack
Aug  4 01:22:33 localhost sshd[3886917]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.16.20  user=root
Aug  4 01:22:35 localhost sshd[3886917]: Failed password for root from 142.4.16.20 port 62838 ssh2
...
2020-08-04 00:50:21
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.4.1.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58161
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.4.1.14.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:03:16 CST 2022
;; MSG SIZE  rcvd: 103
Host info
14.1.4.142.in-addr.arpa domain name pointer 142-4-1-14.unifiedlayer.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
14.1.4.142.in-addr.arpa	name = 142-4-1-14.unifiedlayer.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.73.170.168 attackbotsspam
SQL injection attempt.
2020-03-10 08:42:24
223.223.200.14 attack
$f2bV_matches
2020-03-10 08:24:31
45.224.105.82 attackbots
(imapd) Failed IMAP login from 45.224.105.82 (AR/Argentina/-): 1 in the last 3600 secs
2020-03-10 08:10:13
111.230.247.243 attack
Jan 24 03:39:44 woltan sshd[8269]: Failed password for invalid user mysql from 111.230.247.243 port 49625 ssh2
2020-03-10 08:35:54
218.92.0.212 attackspambots
Mar 10 00:39:11 hcbbdb sshd\[6545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.212  user=root
Mar 10 00:39:13 hcbbdb sshd\[6545\]: Failed password for root from 218.92.0.212 port 28746 ssh2
Mar 10 00:39:16 hcbbdb sshd\[6545\]: Failed password for root from 218.92.0.212 port 28746 ssh2
Mar 10 00:39:20 hcbbdb sshd\[6545\]: Failed password for root from 218.92.0.212 port 28746 ssh2
Mar 10 00:39:23 hcbbdb sshd\[6545\]: Failed password for root from 218.92.0.212 port 28746 ssh2
2020-03-10 08:43:46
197.33.241.27 attackspam
Oct 29 11:38:31 ms-srv sshd[27885]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.33.241.27
Oct 29 11:38:33 ms-srv sshd[27885]: Failed password for invalid user admin from 197.33.241.27 port 54154 ssh2
2020-03-10 08:29:03
211.249.226.104 attack
03/09/2020-20:29:46.581388 211.249.226.104 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-10 08:37:10
221.4.197.74 spamattack
[2020/03/10 08:13:59] [221.4.197.74:21081] User love@luxnetcorp.com.tw login failed.
[2020/03/10 08:13:59] [221.4.197.74:21083] User angel@luxnetcorp.com.tw login failed.
[2020/03/10 08:14:00] [221.4.197.74:21086] User server@luxnetcorp.com.tw login failed.
[2020/03/10 08:14:00] [221.4.197.74:21115] User data@luxnetcorp.com.tw login failed.
[2020/03/10 08:14:00] [221.4.197.74:21118] User good@luxnetcorp.com.tw login failed.
[2020/03/10 08:14:04] [221.4.197.74:21221] User account@luxnetcorp.com.tw login failed.
[2020/03/10 08:14:04] [221.4.197.74:21222] User rob@luxnetcorp.com.tw login failed.
[2020/03/10 08:14:07] [221.4.197.74:21240] User edulapez@luxnetcorp.com.tw login failed.
[2020/03/10 08:14:07] [221.4.197.74:21242] User access@luxnetcorp.com.tw login failed.
[2020/03/10 08:14:09] [221.4.197.74:21248] User data@luxnetcorp.com.tw login failed.
[2020/03/10 08:14:09] [221.4.197.74:21249] User rob@luxnetcorp.com.tw login failed.
2020-03-10 08:15:11
111.231.202.61 attack
Jan  9 03:05:24 woltan sshd[12408]: Failed password for invalid user steam from 111.231.202.61 port 52000 ssh2
2020-03-10 08:06:46
197.46.166.205 attack
Sep  8 11:30:45 ms-srv sshd[15814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.46.166.205
Sep  8 11:30:47 ms-srv sshd[15814]: Failed password for invalid user admin from 197.46.166.205 port 39557 ssh2
2020-03-10 08:03:08
87.101.92.72 attackspam
attempting to identify missing credit card information
2020-03-10 08:17:04
197.44.212.186 attackbotsspam
Oct 29 11:38:11 ms-srv sshd[27820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.44.212.186
Oct 29 11:38:13 ms-srv sshd[27820]: Failed password for invalid user admin from 197.44.212.186 port 59698 ssh2
2020-03-10 08:15:43
197.42.17.183 attack
Dec 22 20:17:59 ms-srv sshd[13743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.42.17.183
Dec 22 20:18:01 ms-srv sshd[13743]: Failed password for invalid user admin from 197.42.17.183 port 42301 ssh2
2020-03-10 08:18:32
111.231.202.159 attack
Dec 28 21:37:06 woltan sshd[29513]: Failed password for invalid user jennipah from 111.231.202.159 port 52610 ssh2
2020-03-10 08:08:08
111.231.121.62 attack
Nov 29 12:10:37 woltan sshd[949]: Failed password for root from 111.231.121.62 port 35188 ssh2
2020-03-10 08:21:05

Recently Reported IPs

142.4.0.99 142.4.0.174 142.4.1.197 142.4.10.113
142.4.110.149 142.4.112.181 142.4.107.60 142.4.117.58
142.4.12.104 142.4.12.107 142.4.1.89 142.4.12.244
142.4.124.1 94.207.245.182 142.4.13.19 191.63.52.0
91.182.34.255 142.4.27.141 142.4.31.115 142.4.27.32