Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: unknown

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.4.27.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65267
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.4.27.122.			IN	A

;; AUTHORITY SECTION:
.			175	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:40:11 CST 2022
;; MSG SIZE  rcvd: 105
Host info
122.27.4.142.in-addr.arpa domain name pointer 142-4-27-122.unifiedlayer.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.27.4.142.in-addr.arpa	name = 142-4-27-122.unifiedlayer.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
216.213.29.190 attack
Looking for resource vulnerabilities
2019-07-28 15:20:44
119.29.158.167 attack
Jul 28 07:53:02 s64-1 sshd[5049]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.158.167
Jul 28 07:53:04 s64-1 sshd[5049]: Failed password for invalid user helmuth from 119.29.158.167 port 39982 ssh2
Jul 28 07:58:29 s64-1 sshd[5091]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.158.167
...
2019-07-28 14:45:06
185.153.198.247 attack
Jul 28 08:07:48 h2177944 kernel: \[2618073.819761\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.198.247 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=43372 PROTO=TCP SPT=41366 DPT=3351 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 28 08:08:56 h2177944 kernel: \[2618142.215046\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.198.247 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=64228 PROTO=TCP SPT=41323 DPT=2016 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 28 08:32:16 h2177944 kernel: \[2619541.659533\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.198.247 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=42288 PROTO=TCP SPT=41348 DPT=8889 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 28 08:34:26 h2177944 kernel: \[2619672.281286\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.198.247 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=38184 PROTO=TCP SPT=41358 DPT=20311 WINDOW=1024 RES=0x00 SYN URGP=0 
Jul 28 08:46:15 h2177944 kernel: \[2620380.783700\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=185.153.198.247 DST=8
2019-07-28 15:13:14
221.132.17.74 attackspam
Jul 28 07:31:58 srv-4 sshd\[27107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.74  user=root
Jul 28 07:32:00 srv-4 sshd\[27107\]: Failed password for root from 221.132.17.74 port 52040 ssh2
Jul 28 07:37:25 srv-4 sshd\[27558\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.132.17.74  user=root
...
2019-07-28 15:10:26
202.43.164.46 attackbots
ssh failed login
2019-07-28 15:06:30
194.99.106.147 attackspambots
leo_www
2019-07-28 15:04:47
5.39.77.117 attackbotsspam
Jul 28 05:07:27 s64-1 sshd[3222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.77.117
Jul 28 05:07:29 s64-1 sshd[3222]: Failed password for invalid user Rhosts authentication refused for % from 5.39.77.117 port 54329 ssh2
Jul 28 05:12:27 s64-1 sshd[3266]: Failed password for root from 5.39.77.117 port 51650 ssh2
...
2019-07-28 14:24:28
201.54.209.2 attackspam
Jul 28 05:04:39 eventyay sshd[15554]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.54.209.2
Jul 28 05:04:42 eventyay sshd[15554]: Failed password for invalid user gunner from 201.54.209.2 port 43594 ssh2
Jul 28 05:10:36 eventyay sshd[17022]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.54.209.2
...
2019-07-28 14:47:56
213.23.12.149 attackspambots
GET /MyAdmin/scripts/setup.php HTTP/1.1
2019-07-28 14:34:34
51.38.57.78 attackspam
Jul 28 06:43:23 server01 sshd\[9741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78  user=root
Jul 28 06:43:26 server01 sshd\[9741\]: Failed password for root from 51.38.57.78 port 38552 ssh2
Jul 28 06:47:17 server01 sshd\[9777\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.57.78  user=root
...
2019-07-28 14:26:12
37.28.154.68 attack
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.28.154.68  user=root
Failed password for root from 37.28.154.68 port 35357 ssh2
Failed password for root from 37.28.154.68 port 35357 ssh2
Failed password for root from 37.28.154.68 port 35357 ssh2
Failed password for root from 37.28.154.68 port 35357 ssh2
2019-07-28 14:59:13
185.234.219.57 attack
Jul 28 08:19:47 relay postfix/smtpd\[20402\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 28 08:20:15 relay postfix/smtpd\[20402\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 28 08:21:46 relay postfix/smtpd\[20402\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 28 08:23:41 relay postfix/smtpd\[20402\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 28 08:24:27 relay postfix/smtpd\[14372\]: warning: unknown\[185.234.219.57\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-07-28 14:27:39
185.51.37.99 attack
Telnet Server BruteForce Attack
2019-07-28 14:33:48
202.121.252.118 attackspam
Jul 28 03:07:09 mail sshd\[28881\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.121.252.118  user=root
Jul 28 03:07:11 mail sshd\[28881\]: Failed password for root from 202.121.252.118 port 36142 ssh2
Jul 28 03:09:12 mail sshd\[29035\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.121.252.118  user=root
...
2019-07-28 14:42:29
5.196.131.175 attackspam
Non-stop spam.
2019-07-28 14:11:35

Recently Reported IPs

142.4.26.98 142.4.27.123 142.4.27.131 142.4.27.55
142.4.27.85 118.96.35.192 142.4.27.59 118.96.35.41
118.96.36.176 142.44.140.168 142.44.142.124 142.44.140.154
142.44.138.52 142.44.139.44 142.44.140.126 142.44.140.98
142.44.143.1 142.44.143.212 142.44.138.91 142.44.140.102