Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.4.9.161 attackspambots
Account phishing spam
2020-04-29 22:21:36
142.4.9.195 attackbots
SpamReport
2019-10-27 08:29:09
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.4.9.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28695
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.4.9.56.			IN	A

;; AUTHORITY SECTION:
.			543	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:04:38 CST 2022
;; MSG SIZE  rcvd: 103
Host info
56.9.4.142.in-addr.arpa domain name pointer 142-4-9-56.unifiedlayer.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
56.9.4.142.in-addr.arpa	name = 142-4-9-56.unifiedlayer.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.101.251.82 attackspam
Oct 10 22:23:47 marvibiene sshd[5272]: Failed password for root from 34.101.251.82 port 56036 ssh2
2020-10-11 13:54:52
112.238.78.55 attackbots
port scan and connect, tcp 23 (telnet)
2020-10-11 13:51:32
61.177.172.61 attackbots
Oct 11 08:04:54 OPSO sshd\[28361\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.61  user=root
Oct 11 08:04:56 OPSO sshd\[28361\]: Failed password for root from 61.177.172.61 port 42416 ssh2
Oct 11 08:04:59 OPSO sshd\[28361\]: Failed password for root from 61.177.172.61 port 42416 ssh2
Oct 11 08:05:04 OPSO sshd\[28361\]: Failed password for root from 61.177.172.61 port 42416 ssh2
Oct 11 08:05:09 OPSO sshd\[28361\]: Failed password for root from 61.177.172.61 port 42416 ssh2
2020-10-11 14:06:03
49.235.190.177 attackspambots
[f2b] sshd bruteforce, retries: 1
2020-10-11 14:11:30
45.129.33.5 attack
 TCP (SYN) 45.129.33.5:42797 -> port 20220, len 44
2020-10-11 13:49:45
118.97.213.194 attackbotsspam
Repeated brute force against a port
2020-10-11 14:12:49
114.67.95.188 attackspambots
Oct 11 07:21:48 vpn01 sshd[9438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.95.188
Oct 11 07:21:50 vpn01 sshd[9438]: Failed password for invalid user apc from 114.67.95.188 port 59234 ssh2
...
2020-10-11 14:14:41
198.211.115.226 attackspambots
198.211.115.226 - - [11/Oct/2020:00:01:39 +0100] "POST /wp-login.php HTTP/1.1" 200 2227 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.211.115.226 - - [11/Oct/2020:00:01:41 +0100] "POST /wp-login.php HTTP/1.1" 200 2157 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
198.211.115.226 - - [11/Oct/2020:00:01:46 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-11 13:48:07
141.98.9.166 attackspambots
Oct 11 07:55:22 inter-technics sshd[3666]: Invalid user admin from 141.98.9.166 port 39975
Oct 11 07:55:22 inter-technics sshd[3666]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.166
Oct 11 07:55:22 inter-technics sshd[3666]: Invalid user admin from 141.98.9.166 port 39975
Oct 11 07:55:24 inter-technics sshd[3666]: Failed password for invalid user admin from 141.98.9.166 port 39975 ssh2
Oct 11 07:55:43 inter-technics sshd[3726]: Invalid user ubnt from 141.98.9.166 port 42725
...
2020-10-11 14:01:15
95.77.104.79 attackbotsspam
Dovecot Invalid User Login Attempt.
2020-10-11 14:13:37
69.55.49.187 attack
Oct 11 06:38:23 vpn01 sshd[8807]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.55.49.187
Oct 11 06:38:25 vpn01 sshd[8807]: Failed password for invalid user git from 69.55.49.187 port 49832 ssh2
...
2020-10-11 13:51:18
141.98.9.163 attackbots
Oct 11 07:55:13 inter-technics sshd[3660]: Invalid user admin from 141.98.9.163 port 42215
Oct 11 07:55:13 inter-technics sshd[3660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.163
Oct 11 07:55:13 inter-technics sshd[3660]: Invalid user admin from 141.98.9.163 port 42215
Oct 11 07:55:15 inter-technics sshd[3660]: Failed password for invalid user admin from 141.98.9.163 port 42215 ssh2
Oct 11 07:55:33 inter-technics sshd[3678]: Invalid user test from 141.98.9.163 port 38215
...
2020-10-11 14:12:17
77.27.168.117 attack
77.27.168.117 (ES/Spain/-), 5 distributed sshd attacks on account [root] in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_DISTATTACK; Logs: Oct 11 01:46:35 jbs1 sshd[30624]: Failed password for root from 77.21.164.143 port 58949 ssh2
Oct 11 01:45:30 jbs1 sshd[30335]: Failed password for root from 77.27.168.117 port 59407 ssh2
Oct 11 01:44:17 jbs1 sshd[29967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.181.80.253  user=root
Oct 11 01:44:19 jbs1 sshd[29967]: Failed password for root from 61.181.80.253 port 39747 ssh2
Oct 11 01:47:13 jbs1 sshd[30837]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.117.250.61  user=root

IP Addresses Blocked:

77.21.164.143 (DE/Germany/-)
2020-10-11 14:07:51
221.120.163.94 attack
2020-10-11T01:40:24.789264sorsha.thespaminator.com sshd[16043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.120.163.94  user=root
2020-10-11T01:40:26.743091sorsha.thespaminator.com sshd[16043]: Failed password for root from 221.120.163.94 port 2402 ssh2
...
2020-10-11 14:09:02
31.168.219.28 attackspambots
Unauthorized connection attempt detected from IP address 31.168.219.28 to port 81
2020-10-11 14:10:17

Recently Reported IPs

142.4.7.99 142.4.5.70 142.4.7.76 142.4.6.207
213.255.18.241 142.4.6.237 142.4.97.33 142.4.9.131
142.44.128.236 142.44.131.5 142.44.129.236 142.44.136.29
142.44.135.249 142.44.136.192 142.44.138.144 142.44.138.103
142.44.138.162 142.44.139.57 142.44.138.84 142.44.138.48