Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
142.44.138.213 attackbotsspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-30T09:21:18Z
2020-09-30 18:19:15
142.44.138.126 attack
Either the hostname did not match a backend or the resource type is not in use
142.44.138.126, 127.0.0.1 - - [18/Apr/2020:07:23:37 +1200] "GET http://[REDACTED]/ HTTP/1.1" 200 2970 "http://www.rime.red" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; +http://www.komodia.com/newwiki/index.php/URL_server_crawler) KomodiaBot/1.0"
142.44.138.126, 127.0.0.1 - - [18/Apr/2020:07:23:39 +1200] "GET http://[REDACTED]/artwork.html" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; +http://www.komodia.com/newwiki/index.php/URL_server_crawler) KomodiaBot/1.0"
142.44.138.126, 127.0.0.1 - - [18/Apr/2020:07:23:40 +1200] "GET http://[REDACTED]/index.html" "Mozilla/5.0 (Windows NT 6.1; Win64; x64; +http://www.komodia.com/newwiki/index.php/URL_server_crawler) KomodiaBot/1.0"
...
2020-04-18 03:50:14
142.44.138.126 attackspam
Automated report (2020-01-31T11:22:28+00:00). Misbehaving bot detected at this address.
2020-01-31 20:20:20
142.44.138.126 attackspam
Automated report (2020-01-27T17:12:17+00:00). Misbehaving bot detected at this address.
2020-01-28 02:38:26
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.44.138.84
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22800
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.44.138.84.			IN	A

;; AUTHORITY SECTION:
.			486	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 27 14:04:43 CST 2022
;; MSG SIZE  rcvd: 106
Host info
84.138.44.142.in-addr.arpa domain name pointer ns551142.ip-142-44-138.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
84.138.44.142.in-addr.arpa	name = ns551142.ip-142-44-138.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
201.93.255.108 attack
2020-09-20T03:57:10.218070hostname sshd[82145]: Failed password for root from 201.93.255.108 port 57098 ssh2
...
2020-09-22 13:53:01
216.45.23.6 attack
SSH BruteForce Attack
2020-09-22 14:11:42
154.221.27.226 attackbots
Sep 22 04:19:25 vlre-nyc-1 sshd\[10574\]: Invalid user admin from 154.221.27.226
Sep 22 04:19:25 vlre-nyc-1 sshd\[10574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.27.226
Sep 22 04:19:26 vlre-nyc-1 sshd\[10574\]: Failed password for invalid user admin from 154.221.27.226 port 53668 ssh2
Sep 22 04:25:38 vlre-nyc-1 sshd\[10751\]: Invalid user ubuntu from 154.221.27.226
Sep 22 04:25:38 vlre-nyc-1 sshd\[10751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.221.27.226
...
2020-09-22 13:41:51
177.37.143.116 attackbotsspam
Automatic report - XMLRPC Attack
2020-09-22 14:15:08
212.166.68.146 attack
Time:     Tue Sep 22 06:46:10 2020 +0200
IP:       212.166.68.146 (ES/Spain/static.146.68.166.212.ibercom.com)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 22 06:40:41 mail-03 sshd[13519]: Invalid user scheduler from 212.166.68.146 port 60422
Sep 22 06:40:43 mail-03 sshd[13519]: Failed password for invalid user scheduler from 212.166.68.146 port 60422 ssh2
Sep 22 06:44:26 mail-03 sshd[13665]: Invalid user fourjs from 212.166.68.146 port 49390
Sep 22 06:44:28 mail-03 sshd[13665]: Failed password for invalid user fourjs from 212.166.68.146 port 49390 ssh2
Sep 22 06:46:05 mail-03 sshd[13710]: Invalid user asterisk from 212.166.68.146 port 42030
2020-09-22 14:02:11
186.250.89.72 attackspambots
Sep 22 04:20:04 vps333114 sshd[7071]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.250.89.72
Sep 22 04:20:06 vps333114 sshd[7071]: Failed password for invalid user oracle from 186.250.89.72 port 47444 ssh2
...
2020-09-22 14:02:37
161.35.127.147 attackbots
Sep 22 05:05:43 santamaria sshd\[32092\]: Invalid user tt from 161.35.127.147
Sep 22 05:05:43 santamaria sshd\[32092\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.35.127.147
Sep 22 05:05:45 santamaria sshd\[32092\]: Failed password for invalid user tt from 161.35.127.147 port 39170 ssh2
...
2020-09-22 12:48:13
45.113.71.209 attackspambots
Honeypot hit.
2020-09-22 13:53:46
176.56.237.229 attackbotsspam
Tried sshing with brute force.
2020-09-22 13:41:22
118.25.91.168 attackbots
Sep 21 23:59:39 vps647732 sshd[19603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.91.168
Sep 21 23:59:40 vps647732 sshd[19603]: Failed password for invalid user huawei from 118.25.91.168 port 44416 ssh2
...
2020-09-22 13:46:42
216.218.206.95 attackbots
Port scan: Attack repeated for 24 hours
2020-09-22 13:51:57
128.199.156.25 attackbots
Sep 22 05:28:09 mail sshd[10489]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.156.25
2020-09-22 14:03:16
103.130.213.150 attackbots
Cowrie Honeypot: 2 unauthorised SSH/Telnet login attempts between 2020-09-22T03:03:35Z and 2020-09-22T03:10:12Z
2020-09-22 13:56:03
167.99.96.114 attackbotsspam
Sep 22 01:20:50 firewall sshd[9361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.96.114  user=root
Sep 22 01:20:53 firewall sshd[9361]: Failed password for root from 167.99.96.114 port 38972 ssh2
Sep 22 01:24:28 firewall sshd[9473]: Invalid user markus from 167.99.96.114
...
2020-09-22 14:12:22
190.111.151.194 attack
sshd jail - ssh hack attempt
2020-09-22 14:11:57

Recently Reported IPs

142.44.139.57 142.44.138.48 142.44.142.171 142.44.144.182
142.44.144.41 142.44.146.155 142.44.148.199 142.44.148.196
142.44.140.172 142.44.151.121 142.44.150.184 142.44.156.36
142.44.163.157 142.44.156.111 142.44.164.166 142.44.166.13
142.44.169.236 142.44.179.41 142.44.187.202 142.44.166.226