Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: SMTVPS.com

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attack
445/tcp 445/tcp 445/tcp...
[2019-05-10/07-11]19pkt,1pt.(tcp)
2019-07-11 16:07:40
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.4.104.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21766
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.4.104.145.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019042502 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 26 13:01:10 +08 2019
;; MSG SIZE  rcvd: 117

Host info
Host 145.104.4.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 145.104.4.142.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
108.163.251.66 attackspambots
Blocking for trying to access an exploit file: /content-post.php
2019-06-21 15:34:44
2.86.50.36 attackbotsspam
Jun 21 06:31:11 mxgate1 postfix/postscreen[19029]: CONNECT from [2.86.50.36]:42071 to [176.31.12.44]:25
Jun 21 06:31:11 mxgate1 postfix/dnsblog[19030]: addr 2.86.50.36 listed by domain zen.spamhaus.org as 127.0.0.10
Jun 21 06:31:11 mxgate1 postfix/dnsblog[19030]: addr 2.86.50.36 listed by domain zen.spamhaus.org as 127.0.0.4
Jun 21 06:31:11 mxgate1 postfix/dnsblog[19033]: addr 2.86.50.36 listed by domain cbl.abuseat.org as 127.0.0.2
Jun 21 06:31:11 mxgate1 postfix/dnsblog[19031]: addr 2.86.50.36 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jun 21 06:31:11 mxgate1 postfix/dnsblog[19034]: addr 2.86.50.36 listed by domain bl.spamcop.net as 127.0.0.2
Jun 21 06:31:17 mxgate1 postfix/postscreen[19029]: DNSBL rank 5 for [2.86.50.36]:42071
Jun x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=2.86.50.36
2019-06-21 14:58:21
189.90.112.182 attack
8080/tcp
[2019-06-21]1pkt
2019-06-21 15:08:15
177.234.158.242 attackspam
xmlrpc attack
2019-06-21 15:27:24
132.255.29.228 attackbots
2019-06-21T06:53:29.672550abusebot-8.cloudsearch.cf sshd\[14901\]: Invalid user test from 132.255.29.228 port 48626
2019-06-21 15:28:10
80.88.90.35 attackbotsspam
RDP Bruteforce
2019-06-21 14:50:48
134.209.110.130 attackbotsspam
DATE:2019-06-21_06:41:26, IP:134.209.110.130, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-06-21 15:19:59
61.163.159.200 attack
5500/tcp
[2019-06-21]1pkt
2019-06-21 15:04:34
171.244.38.41 attackbotsspam
Jun 21 08:23:09 amit sshd\[8456\]: Invalid user test from 171.244.38.41
Jun 21 08:23:09 amit sshd\[8456\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.38.41
Jun 21 08:23:10 amit sshd\[8456\]: Failed password for invalid user test from 171.244.38.41 port 50872 ssh2
...
2019-06-21 15:15:44
195.182.153.242 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-06-21 15:38:36
197.50.28.92 attack
9000/tcp
[2019-06-21]1pkt
2019-06-21 14:45:30
5.83.183.127 attackbotsspam
Jun 21 06:34:20 reporting4 sshd[19163]: Invalid user plexuser from 5.83.183.127
Jun 21 06:34:20 reporting4 sshd[19163]: Failed none for invalid user plexuser from 5.83.183.127 port 55280 ssh2
Jun 21 06:34:22 reporting4 sshd[19163]: Failed password for invalid user plexuser from 5.83.183.127 port 55280 ssh2
Jun 21 06:35:46 reporting4 sshd[19844]: Invalid user openhabian from 5.83.183.127
Jun 21 06:35:46 reporting4 sshd[19844]: Failed none for invalid user openhabian from 5.83.183.127 port 36237 ssh2
Jun 21 06:35:46 reporting4 sshd[19844]: Failed password for invalid user openhabian from 5.83.183.127 port 36237 ssh2
Jun 21 06:35:49 reporting4 sshd[20678]: Invalid user admin from 5.83.183.127
Jun 21 06:35:49 reporting4 sshd[20678]: Failed none for invalid user admin from 5.83.183.127 port 45665 ssh2
Jun 21 06:35:50 reporting4 sshd[20678]: Failed password for invalid user admin from 5.83.183.127 port 45665 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=5.8
2019-06-21 15:07:14
113.8.65.89 attack
23/tcp
[2019-06-21]1pkt
2019-06-21 15:25:19
109.226.251.216 attackspam
¯\_(ツ)_/¯
2019-06-21 15:35:33
112.249.195.97 attackspambots
23/tcp
[2019-06-21]1pkt
2019-06-21 14:51:23

Recently Reported IPs

78.134.3.221 113.177.27.217 187.44.210.246 171.251.52.150
198.199.107.41 186.226.172.1 45.55.47.128 84.201.253.180
89.233.219.172 117.133.157.8 91.221.67.153 76.107.18.138
61.61.199.227 86.172.105.204 36.73.33.15 193.32.163.72
104.175.187.232 83.242.254.170 50.193.103.107 202.7.53.156