Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.45.65.75
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11824
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.45.65.75.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 15:19:46 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 75.65.45.142.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 142.45.65.75.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
31.171.1.46 attackbots
Unauthorized IMAP connection attempt
2020-03-16 21:28:02
192.241.235.39 attack
Unauthorized connection attempt detected from IP address 192.241.235.39 to port 139 [T]
2020-03-16 21:24:22
202.147.198.155 attackspam
SSH bruteforce
2020-03-16 22:04:34
81.10.50.71 attackspam
[munged]::443 81.10.50.71 - - [16/Mar/2020:14:18:51 +0100] "POST /[munged]: HTTP/1.1" 200 12127 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 81.10.50.71 - - [16/Mar/2020:14:18:52 +0100] "POST /[munged]: HTTP/1.1" 200 7508 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 81.10.50.71 - - [16/Mar/2020:14:18:53 +0100] "POST /[munged]: HTTP/1.1" 200 7508 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 81.10.50.71 - - [16/Mar/2020:14:18:54 +0100] "POST /[munged]: HTTP/1.1" 200 7508 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 81.10.50.71 - - [16/Mar/2020:14:18:55 +0100] "POST /[munged]: HTTP/1.1" 200 7508 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::443 81.10.50.71 - - [16/Mar/2020:14:18:56 +0100] "POS
2020-03-16 21:31:48
122.252.229.154 attack
1584335313 - 03/16/2020 06:08:33 Host: 122.252.229.154/122.252.229.154 Port: 445 TCP Blocked
2020-03-16 21:59:13
129.204.50.75 attackspambots
2020-03-16T10:03:33.060237scmdmz1 sshd[24657]: Failed password for invalid user scan from 129.204.50.75 port 48804 ssh2
2020-03-16T10:10:33.525307scmdmz1 sshd[25301]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.50.75  user=root
2020-03-16T10:10:35.161972scmdmz1 sshd[25301]: Failed password for root from 129.204.50.75 port 58752 ssh2
...
2020-03-16 22:08:07
221.226.50.162 attackbots
[munged]::80 221.226.50.162 - - [16/Mar/2020:13:31:36 +0100] "POST /[munged]: HTTP/1.1" 200 4561 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 221.226.50.162 - - [16/Mar/2020:13:31:37 +0100] "POST /[munged]: HTTP/1.1" 200 4560 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 221.226.50.162 - - [16/Mar/2020:13:31:38 +0100] "POST /[munged]: HTTP/1.1" 200 4560 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 221.226.50.162 - - [16/Mar/2020:13:31:41 +0100] "POST /[munged]: HTTP/1.1" 200 4560 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 221.226.50.162 - - [16/Mar/2020:13:31:43 +0100] "POST /[munged]: HTTP/1.1" 200 4560 "http://[munged]:/[munged]:" "Mozilla/5.0 (Windows NT 6.1; rv:60.0) Gecko/20100101 Firefox/60.0"
[munged]::80 221.226.50.162 - - [16/Mar/2020:13:31:44
2020-03-16 21:42:37
188.215.179.193 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-16 22:05:13
49.232.161.115 attackspam
Mar 16 11:52:16 ns382633 sshd\[31860\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.161.115  user=root
Mar 16 11:52:18 ns382633 sshd\[31860\]: Failed password for root from 49.232.161.115 port 46950 ssh2
Mar 16 12:17:33 ns382633 sshd\[1898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.161.115  user=root
Mar 16 12:17:36 ns382633 sshd\[1898\]: Failed password for root from 49.232.161.115 port 43058 ssh2
Mar 16 12:27:57 ns382633 sshd\[2904\]: Invalid user gitlab-prometheus from 49.232.161.115 port 43012
Mar 16 12:27:57 ns382633 sshd\[2904\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.161.115
2020-03-16 21:49:13
218.255.139.66 attackbots
$f2bV_matches
2020-03-16 21:32:53
102.131.59.246 attackspam
Mar 16 00:13:51 gutwein sshd[4446]: Failed password for r.r from 102.131.59.246 port 59714 ssh2
Mar 16 00:13:52 gutwein sshd[4446]: Received disconnect from 102.131.59.246: 11: Bye Bye [preauth]
Mar 16 00:23:16 gutwein sshd[6163]: Failed password for r.r from 102.131.59.246 port 39234 ssh2
Mar 16 00:23:16 gutwein sshd[6163]: Received disconnect from 102.131.59.246: 11: Bye Bye [preauth]
Mar 16 00:28:19 gutwein sshd[7156]: Failed password for r.r from 102.131.59.246 port 54654 ssh2
Mar 16 00:28:20 gutwein sshd[7156]: Received disconnect from 102.131.59.246: 11: Bye Bye [preauth]
Mar 16 00:31:36 gutwein sshd[7719]: Failed password for r.r from 102.131.59.246 port 41846 ssh2
Mar 16 00:31:37 gutwein sshd[7719]: Received disconnect from 102.131.59.246: 11: Bye Bye [preauth]
Mar 16 00:36:31 gutwein sshd[8643]: Failed password for r.r from 102.131.59.246 port 57264 ssh2
Mar 16 00:36:31 gutwein sshd[8643]: Received disconnect from 102.131.59.246: 11: Bye Bye [preauth]
Mar 16 00........
-------------------------------
2020-03-16 21:55:07
190.60.210.178 attack
5x Failed Password
2020-03-16 21:23:37
190.193.37.83 attackspam
Mar 16 14:08:54 localhost sshd\[15747\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.193.37.83  user=root
Mar 16 14:08:56 localhost sshd\[15747\]: Failed password for root from 190.193.37.83 port 47768 ssh2
Mar 16 14:17:56 localhost sshd\[17853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.193.37.83  user=root
2020-03-16 21:20:15
128.0.129.192 attack
Invalid user adrian from 128.0.129.192 port 46472
2020-03-16 22:01:32
14.139.173.129 attackspambots
Mar 16 10:24:06 work-partkepr sshd\[26265\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.139.173.129  user=root
Mar 16 10:24:08 work-partkepr sshd\[26265\]: Failed password for root from 14.139.173.129 port 42191 ssh2
...
2020-03-16 21:24:00

Recently Reported IPs

62.114.20.139 241.24.0.168 236.255.173.219 51.58.247.141
142.199.49.240 2.48.203.232 61.74.78.240 79.235.189.38
150.48.129.137 214.82.214.204 235.198.99.9 209.170.177.206
224.247.217.142 146.254.67.146 72.58.236.168 174.194.147.69
31.204.17.128 234.122.9.4 185.100.47.249 42.252.248.220