Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Montreal

Region: Quebec

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: OVH SAS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.44.136.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54574
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.44.136.44.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040100 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Mon Apr 01 23:28:22 +08 2019
;; MSG SIZE  rcvd: 117

Host info
44.136.44.142.in-addr.arpa domain name pointer cpam7.likuid.com.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
44.136.44.142.in-addr.arpa	name = cpam7.likuid.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.7 attackspambots
Feb 17 16:12:05 vmanager6029 sshd\[11357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.7  user=root
Feb 17 16:12:07 vmanager6029 sshd\[11357\]: Failed password for root from 222.186.42.7 port 53652 ssh2
Feb 17 16:12:09 vmanager6029 sshd\[11357\]: Failed password for root from 222.186.42.7 port 53652 ssh2
2020-02-17 23:13:15
192.117.6.125 attackbots
23/tcp 81/tcp
[2020-02-06/17]2pkt
2020-02-17 23:03:41
177.53.83.183 attackspam
1581946714 - 02/17/2020 20:38:34 Host: 177-53-83-183.telecominternet.com.br/177.53.83.183 Port: 23 TCP Blocked
...
2020-02-17 23:14:47
86.23.56.86 attackspambots
Automatic report - Port Scan Attack
2020-02-17 22:55:21
213.6.78.6 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 22:32:06
213.6.45.22 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 22:38:38
218.92.0.199 attackspambots
Feb 17 14:39:06 vmanager6029 sshd\[9570\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199  user=root
Feb 17 14:39:08 vmanager6029 sshd\[9570\]: Failed password for root from 218.92.0.199 port 34934 ssh2
Feb 17 14:39:10 vmanager6029 sshd\[9570\]: Failed password for root from 218.92.0.199 port 34934 ssh2
2020-02-17 22:31:43
124.152.158.62 attackbotsspam
1433/tcp 1433/tcp 1433/tcp...
[2020-01-05/02-17]6pkt,1pt.(tcp)
2020-02-17 22:39:32
80.211.242.203 attackbots
Tried sshing with brute force.
2020-02-17 22:31:30
37.55.243.196 attackbotsspam
Port probing on unauthorized port 23
2020-02-17 23:11:23
213.6.151.210 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 23:06:51
34.84.249.101 attack
5432/tcp 5432/tcp 5432/tcp
[2020-02-05/17]3pkt
2020-02-17 22:34:49
198.108.66.109 attackbots
21/tcp 1311/tcp 27017/tcp...
[2020-01-07/02-17]8pkt,8pt.(tcp)
2020-02-17 23:12:05
36.7.137.180 attackspam
Portscan or hack attempt detected by psad/fwsnort
2020-02-17 23:05:09
90.142.51.185 attack
23/tcp 5555/tcp
[2020-02-09/17]2pkt
2020-02-17 23:00:04

Recently Reported IPs

156.218.182.69 58.96.241.158 71.40.199.27 92.63.196.21
217.218.225.36 103.214.194.24 59.115.122.109 196.38.48.76
123.207.126.145 61.231.109.205 59.30.39.51 113.11.47.242
59.34.225.15 96.239.59.131 122.114.99.30 222.135.61.6
59.97.179.102 167.99.143.90 172.247.195.122 117.211.111.144