Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.4.120.20
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8969
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.4.120.20.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030700 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 07 19:01:24 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 20.120.4.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 20.120.4.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
102.32.99.63 attack
WordPress wp-login brute force :: 102.32.99.63 0.060 BYPASS [30/Sep/2020:20:41:51  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2577 "https://[censored_2]/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36"
2020-10-01 20:08:03
127.0.0.1 attackspam
Test Connectivity
2020-10-01 19:34:37
166.62.100.99 attackbotsspam
166.62.100.99 - - [01/Oct/2020:10:36:12 +0200] "POST /wp-login.php HTTP/1.0" 200 4794 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-01 19:46:44
5.188.84.95 attack
1,36-01/02 [bc01/m15] PostRequest-Spammer scoring: Lusaka01
2020-10-01 19:39:28
189.235.155.30 attackspambots
WordPress wp-login brute force :: 189.235.155.30 0.060 BYPASS [30/Sep/2020:20:41:52  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2549 "https://[censored_2]/wp-login.php" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36"
2020-10-01 20:06:23
51.158.153.18 attack
Invalid user reception from 51.158.153.18 port 43342
2020-10-01 19:58:52
113.182.182.81 attackspam
Automatic report - Port Scan Attack
2020-10-01 19:51:57
190.198.25.34 attackbotsspam
445/tcp
[2020-09-30]1pkt
2020-10-01 20:02:25
34.72.30.48 attackbotsspam
uvcm 34.72.30.48 [28/Sep/2020:18:31:52 "-" "POST /wp-login.php 200 2273
34.72.30.48 [01/Oct/2020:06:46:38 "-" "GET /wp-login.php 200 1549
34.72.30.48 [01/Oct/2020:06:46:39 "-" "POST /wp-login.php 200 1935
2020-10-01 20:10:22
217.133.58.148 attackspam
217.133.58.148 (IT/Italy/-), 6 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct  1 06:57:41 server2 sshd[980]: Failed password for root from 217.133.58.148 port 45157 ssh2
Oct  1 07:12:27 server2 sshd[14053]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.67.180  user=root
Oct  1 07:02:24 server2 sshd[5303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.53.186.113  user=root
Oct  1 07:02:26 server2 sshd[5303]: Failed password for root from 60.53.186.113 port 2840 ssh2
Oct  1 07:01:24 server2 sshd[4545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.121.38.246  user=root
Oct  1 07:01:26 server2 sshd[4545]: Failed password for root from 117.121.38.246 port 58624 ssh2

IP Addresses Blocked:
2020-10-01 19:52:22
218.92.0.210 attackbotsspam
2020-10-01T11:13:14.625623server.espacesoutien.com sshd[20648]: Failed password for root from 218.92.0.210 port 36422 ssh2
2020-10-01T11:13:16.941578server.espacesoutien.com sshd[20648]: Failed password for root from 218.92.0.210 port 36422 ssh2
2020-10-01T11:14:19.908448server.espacesoutien.com sshd[20708]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.210  user=root
2020-10-01T11:14:21.499485server.espacesoutien.com sshd[20708]: Failed password for root from 218.92.0.210 port 23761 ssh2
...
2020-10-01 19:32:47
67.205.169.62 attack
SSH/22 MH Probe, BF, Hack -
2020-10-01 20:04:52
42.57.116.196 attack
Port Scan detected!
...
2020-10-01 19:38:15
119.28.4.87 attackspambots
Cowrie Honeypot: 3 unauthorised SSH/Telnet login attempts between 2020-10-01T11:08:12Z and 2020-10-01T11:10:27Z
2020-10-01 19:57:04
62.28.217.62 attackbots
Oct  1 13:56:00  sshd\[1879\]: Invalid user glassfish from 62.28.217.62Oct  1 13:56:02  sshd\[1879\]: Failed password for invalid user glassfish from 62.28.217.62 port 58837 ssh2
...
2020-10-01 19:58:19

Recently Reported IPs

18.134.153.166 166.254.6.162 122.202.75.63 195.221.90.159
229.184.72.220 89.205.94.83 202.65.221.175 152.153.48.75
141.248.241.163 61.20.171.154 82.147.96.29 192.247.133.158
42.124.7.19 225.162.157.35 172.244.142.254 251.133.139.196
149.56.18.18 221.248.3.115 92.123.240.110 255.235.90.224