Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.44.194.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20907
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.44.194.48.			IN	A

;; AUTHORITY SECTION:
.			57	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030803 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 09 09:40:53 CST 2022
;; MSG SIZE  rcvd: 106
Host info
48.194.44.142.in-addr.arpa domain name pointer ip48.ip-142-44-194.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.194.44.142.in-addr.arpa	name = ip48.ip-142-44-194.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.51.92.215 attack
Mar 29 18:23:55 NPSTNNYC01T sshd[23754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.92.215
Mar 29 18:23:57 NPSTNNYC01T sshd[23754]: Failed password for invalid user cmp from 122.51.92.215 port 60800 ssh2
Mar 29 18:29:34 NPSTNNYC01T sshd[24138]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.92.215
...
2020-03-30 06:45:44
87.250.224.72 attackspam
[Mon Mar 30 04:33:13.803041 2020] [:error] [pid 3444:tid 140228526335744] [client 87.250.224.72:48021] [client 87.250.224.72] ModSecurity: Access denied with code 403 (phase 2). Pattern match "^[\\\\d.:]+$" at REQUEST_HEADERS:Host. [file "/etc/modsecurity/owasp-modsecurity-crs-3.2.0/rules/REQUEST-920-PROTOCOL-ENFORCEMENT.conf"] [line "696"] [id "920350"] [msg "Host header is a numeric IP address"] [data "103.27.207.197"] [severity "WARNING"] [ver "OWASP_CRS/3.2.0"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-protocol"] [tag "OWASP_CRS"] [tag "OWASP_CRS/PROTOCOL_VIOLATION/IP_HOST"] [tag "WASCTC/WASC-21"] [tag "OWASP_TOP_10/A7"] [tag "PCI/6.5.10"] [hostname "103.27.207.197"] [uri "/"] [unique_id "XoEUGd1ev-Yl28oiT69eZAAAATw"]
...
2020-03-30 06:28:34
100.37.210.134 attackspam
Mar 29 20:32:57 zn008 sshd[14566]: Invalid user lqh from 100.37.210.134
Mar 29 20:32:57 zn008 sshd[14566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-100-37-210-134.nycmny.fios.verizon.net 
Mar 29 20:33:00 zn008 sshd[14566]: Failed password for invalid user lqh from 100.37.210.134 port 45968 ssh2
Mar 29 20:33:00 zn008 sshd[14566]: Received disconnect from 100.37.210.134: 11: Bye Bye [preauth]
Mar 29 20:44:05 zn008 sshd[15583]: Invalid user jen from 100.37.210.134
Mar 29 20:44:05 zn008 sshd[15583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=static-100-37-210-134.nycmny.fios.verizon.net 
Mar 29 20:44:07 zn008 sshd[15583]: Failed password for invalid user jen from 100.37.210.134 port 36886 ssh2
Mar 29 20:44:07 zn008 sshd[15583]: Received disconnect from 100.37.210.134: 11: Bye Bye [preauth]
Mar 29 20:49:15 zn008 sshd[16065]: Invalid user chimistry from 100.37.210.134
Mar 29 20:........
-------------------------------
2020-03-30 06:20:05
199.187.120.60 attackspam
Invalid user shazi from 199.187.120.60 port 35740
2020-03-30 06:45:59
49.234.27.90 attackbots
$f2bV_matches
2020-03-30 06:40:38
106.12.90.86 attackbots
Mar 29 17:58:11 NPSTNNYC01T sshd[21889]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.90.86
Mar 29 17:58:13 NPSTNNYC01T sshd[21889]: Failed password for invalid user party from 106.12.90.86 port 10651 ssh2
Mar 29 18:00:53 NPSTNNYC01T sshd[22109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.90.86
...
2020-03-30 06:22:39
43.226.146.134 attack
Invalid user spice from 43.226.146.134 port 35470
2020-03-30 06:23:34
101.255.52.171 attack
2020-03-29T21:26:05.925204dmca.cloudsearch.cf sshd[28300]: Invalid user cqo from 101.255.52.171 port 34966
2020-03-29T21:26:05.940047dmca.cloudsearch.cf sshd[28300]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.52.171
2020-03-29T21:26:05.925204dmca.cloudsearch.cf sshd[28300]: Invalid user cqo from 101.255.52.171 port 34966
2020-03-29T21:26:07.930359dmca.cloudsearch.cf sshd[28300]: Failed password for invalid user cqo from 101.255.52.171 port 34966 ssh2
2020-03-29T21:33:31.026648dmca.cloudsearch.cf sshd[28865]: Invalid user hgg from 101.255.52.171 port 55014
2020-03-29T21:33:31.036853dmca.cloudsearch.cf sshd[28865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.52.171
2020-03-29T21:33:31.026648dmca.cloudsearch.cf sshd[28865]: Invalid user hgg from 101.255.52.171 port 55014
2020-03-29T21:33:33.257708dmca.cloudsearch.cf sshd[28865]: Failed password for invalid user hgg from 101.255.52.171 
...
2020-03-30 06:11:10
111.229.44.73 attackspam
Brute-force attempt banned
2020-03-30 06:22:10
106.12.80.246 attackspam
Mar 30 00:18:29 h2779839 sshd[17514]: Invalid user ddo from 106.12.80.246 port 9480
Mar 30 00:18:29 h2779839 sshd[17514]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.80.246
Mar 30 00:18:29 h2779839 sshd[17514]: Invalid user ddo from 106.12.80.246 port 9480
Mar 30 00:18:31 h2779839 sshd[17514]: Failed password for invalid user ddo from 106.12.80.246 port 9480 ssh2
Mar 30 00:21:20 h2779839 sshd[17592]: Invalid user sam from 106.12.80.246 port 46620
Mar 30 00:21:20 h2779839 sshd[17592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.80.246
Mar 30 00:21:20 h2779839 sshd[17592]: Invalid user sam from 106.12.80.246 port 46620
Mar 30 00:21:22 h2779839 sshd[17592]: Failed password for invalid user sam from 106.12.80.246 port 46620 ssh2
Mar 30 00:24:14 h2779839 sshd[17672]: Invalid user oracle from 106.12.80.246 port 27259
...
2020-03-30 06:25:59
58.56.33.221 attack
SSH/22 MH Probe, BF, Hack -
2020-03-30 06:43:07
91.103.27.235 attackbots
Mar 30 00:36:42 jane sshd[8367]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.103.27.235 
Mar 30 00:36:43 jane sshd[8367]: Failed password for invalid user kichida from 91.103.27.235 port 55326 ssh2
...
2020-03-30 06:40:05
202.137.155.203 attackbots
Brute force attempt
2020-03-30 06:27:40
99.99.139.67 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/99.99.139.67/ 
 
 US - 1H : (61)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN7018 
 
 IP : 99.99.139.67 
 
 CIDR : 99.96.0.0/13 
 
 PREFIX COUNT : 9621 
 
 UNIQUE IP COUNT : 81496832 
 
 
 ATTACKS DETECTED ASN7018 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 4 
 
 DateTime : 2020-03-29 23:32:51 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2020-03-30 06:42:51
137.74.26.179 attackspam
Invalid user xguest from 137.74.26.179 port 59910
2020-03-30 06:45:09

Recently Reported IPs

142.44.197.77 142.44.197.15 142.44.197.1 142.44.198.1
142.44.198.118 142.44.198.120 142.44.198.185 142.44.198.186
142.44.199.116 142.44.198.192 142.44.198.189 142.44.201.177
142.44.202.121 142.44.199.39 118.96.37.21 118.96.37.67
118.96.46.23 118.96.91.172 118.96.91.19 142.44.245.88