Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.45.145.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24984
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.45.145.127.			IN	A

;; AUTHORITY SECTION:
.			471	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010500 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 05 17:32:13 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 127.145.45.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 127.145.45.142.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
54.93.138.29 attackspam
54.93.138.29 - - [08/Nov/2019:08:01:23 +0100] "POST /wp-login.php HTTP/1.1" 200 2117 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.93.138.29 - - [08/Nov/2019:08:01:23 +0100] "POST /wp-login.php HTTP/1.1" 200 2113 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-11-08 15:51:43
103.104.193.185 attackspambots
Unauthorised access (Nov  8) SRC=103.104.193.185 LEN=52 TOS=0x10 PREC=0x40 TTL=116 ID=28689 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-08 16:04:57
115.231.174.170 attackspambots
Nov  8 08:32:14 icinga sshd[5129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.231.174.170
Nov  8 08:32:16 icinga sshd[5129]: Failed password for invalid user linuxadmin from 115.231.174.170 port 44412 ssh2
...
2019-11-08 15:54:32
222.186.190.2 attack
Nov  8 03:19:32 xentho sshd[31088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Nov  8 03:19:34 xentho sshd[31088]: Failed password for root from 222.186.190.2 port 46618 ssh2
Nov  8 03:19:38 xentho sshd[31088]: Failed password for root from 222.186.190.2 port 46618 ssh2
Nov  8 03:19:32 xentho sshd[31088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Nov  8 03:19:34 xentho sshd[31088]: Failed password for root from 222.186.190.2 port 46618 ssh2
Nov  8 03:19:38 xentho sshd[31088]: Failed password for root from 222.186.190.2 port 46618 ssh2
Nov  8 03:19:32 xentho sshd[31088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.2  user=root
Nov  8 03:19:34 xentho sshd[31088]: Failed password for root from 222.186.190.2 port 46618 ssh2
Nov  8 03:19:38 xentho sshd[31088]: Failed password for root from 222.186
...
2019-11-08 16:20:20
180.76.196.179 attackspambots
Nov  8 07:25:19 fr01 sshd[11129]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.196.179  user=root
Nov  8 07:25:20 fr01 sshd[11129]: Failed password for root from 180.76.196.179 port 46316 ssh2
Nov  8 07:29:37 fr01 sshd[11911]: Invalid user rails from 180.76.196.179
...
2019-11-08 15:52:26
85.25.199.69 attackbots
Nov 07 07:53:50 host sshd[26402]: Invalid user jason from 85.25.199.69 port 18441
2019-11-08 16:01:02
163.172.60.213 attackbotsspam
POST /wp-login.php HTTP/1.1 200 1827 Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2019-11-08 15:58:55
118.25.177.241 attackbotsspam
invalid user
2019-11-08 16:17:19
52.187.106.61 attack
Nov  8 08:19:58 MK-Soft-VM5 sshd[31517]: Failed password for root from 52.187.106.61 port 36256 ssh2
...
2019-11-08 15:53:04
222.188.109.227 attackbotsspam
Nov  8 08:20:33 dedicated sshd[5103]: Invalid user fu from 222.188.109.227 port 50918
2019-11-08 16:07:45
62.234.141.187 attackbotsspam
Nov  8 07:43:40 srv-ubuntu-dev3 sshd[124064]: Invalid user qwerty from 62.234.141.187
Nov  8 07:43:40 srv-ubuntu-dev3 sshd[124064]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.141.187
Nov  8 07:43:40 srv-ubuntu-dev3 sshd[124064]: Invalid user qwerty from 62.234.141.187
Nov  8 07:43:42 srv-ubuntu-dev3 sshd[124064]: Failed password for invalid user qwerty from 62.234.141.187 port 58192 ssh2
Nov  8 07:48:39 srv-ubuntu-dev3 sshd[124404]: Invalid user thanhlong from 62.234.141.187
Nov  8 07:48:39 srv-ubuntu-dev3 sshd[124404]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.141.187
Nov  8 07:48:39 srv-ubuntu-dev3 sshd[124404]: Invalid user thanhlong from 62.234.141.187
Nov  8 07:48:41 srv-ubuntu-dev3 sshd[124404]: Failed password for invalid user thanhlong from 62.234.141.187 port 38128 ssh2
Nov  8 07:53:27 srv-ubuntu-dev3 sshd[124785]: Invalid user hhh258 from 62.234.141.187
...
2019-11-08 16:19:01
81.22.45.107 attackspambots
Nov  8 09:16:00 mc1 kernel: \[4487253.738134\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=11420 PROTO=TCP SPT=49947 DPT=53780 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  8 09:20:40 mc1 kernel: \[4487533.444698\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=58186 PROTO=TCP SPT=49947 DPT=53935 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  8 09:24:16 mc1 kernel: \[4487749.689404\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.107 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=33789 PROTO=TCP SPT=49947 DPT=53658 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-08 16:27:28
167.99.173.234 attack
Nov  4 15:33:46 b2b-pharm sshd[10826]: Invalid user altered from 167.99.173.234 port 57888
Nov  4 15:33:46 b2b-pharm sshd[10826]: error: maximum authentication attempts exceeded for invalid user altered from 167.99.173.234 port 57888 ssh2 [preauth]
Nov  4 15:33:46 b2b-pharm sshd[10826]: Invalid user altered from 167.99.173.234 port 57888
Nov  4 15:33:46 b2b-pharm sshd[10826]: error: maximum authentication attempts exceeded for invalid user altered from 167.99.173.234 port 57888 ssh2 [preauth]
Nov  4 15:33:46 b2b-pharm sshd[10826]: Invalid user altered from 167.99.173.234 port 57888
Nov  4 15:33:46 b2b-pharm sshd[10826]: error: maximum authentication attempts exceeded for invalid user altered from 167.99.173.234 port 57888 ssh2 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=167.99.173.234
2019-11-08 16:11:09
165.227.179.138 attack
Nov  8 01:29:15 srv3 sshd\[19172\]: Invalid user iiiii from 165.227.179.138
Nov  8 01:29:15 srv3 sshd\[19172\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.179.138
Nov  8 01:29:18 srv3 sshd\[19172\]: Failed password for invalid user iiiii from 165.227.179.138 port 49698 ssh2
...
2019-11-08 16:06:38
103.122.12.106 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-08 16:27:07

Recently Reported IPs

68.183.103.253 68.183.101.78 190.17.19.44 68.169.163.154
3.51.45.227 68.132.139.19 235.133.61.14 54.250.229.97
35.217.49.10 130.141.160.189 234.70.150.123 198.27.240.128
154.109.160.181 110.9.180.184 1.97.1.140 9.197.150.67
13.232.187.253 192.7.182.188 67.68.163.23 67.68.28.56