Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.45.89.137
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41216
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.45.89.137.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012500 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 00:02:04 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 137.89.45.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 142.45.89.137.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
115.134.128.90 attackspambots
Jul 31 19:14:54 OPSO sshd\[12149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.134.128.90  user=root
Jul 31 19:14:57 OPSO sshd\[12149\]: Failed password for root from 115.134.128.90 port 57688 ssh2
Jul 31 19:17:50 OPSO sshd\[12693\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.134.128.90  user=root
Jul 31 19:17:52 OPSO sshd\[12693\]: Failed password for root from 115.134.128.90 port 43238 ssh2
Jul 31 19:20:48 OPSO sshd\[13161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.134.128.90  user=root
2020-08-01 03:25:09
222.186.15.246 attack
SSH Bruteforce Attempt on Honeypot
2020-08-01 03:06:38
45.141.87.4 attackbotsspam
sshd[5184]: Bad protocol version identification '\003' from 45.141.87.4 port 65176
2020-08-01 02:50:29
132.232.8.23 attackspam
Jul 31 19:34:22 [host] sshd[1429]: pam_unix(sshd:a
Jul 31 19:34:24 [host] sshd[1429]: Failed password
Jul 31 19:38:29 [host] sshd[1574]: pam_unix(sshd:a
2020-08-01 03:19:04
111.231.226.68 attack
Jul 31 16:55:29 myvps sshd[6847]: Failed password for root from 111.231.226.68 port 54578 ssh2
Jul 31 17:04:02 myvps sshd[19786]: Failed password for root from 111.231.226.68 port 43018 ssh2
...
2020-08-01 03:23:23
45.129.33.21 attack
Automatic report - Port Scan
2020-08-01 02:59:55
148.251.195.14 attackbotsspam
20 attempts against mh-misbehave-ban on comet
2020-08-01 03:03:05
87.245.129.114 attackspam
Unauthorized connection attempt from IP address 87.245.129.114 on Port 445(SMB)
2020-08-01 02:51:27
92.51.72.10 attackspambots
Unauthorized connection attempt from IP address 92.51.72.10 on Port 445(SMB)
2020-08-01 03:02:18
186.206.150.254 attack
Automatic report - Port Scan Attack
2020-08-01 03:23:02
46.105.227.206 attackspam
SSH Brute Force
2020-08-01 03:05:55
114.26.187.130 attack
Unauthorized connection attempt from IP address 114.26.187.130 on Port 445(SMB)
2020-08-01 03:11:28
223.111.157.138 attack
22001/tcp 2220/tcp 2201/tcp...
[2020-06-01/07-31]2026pkt,799pt.(tcp)
2020-08-01 03:24:23
2.236.136.193 attackspam
Automatic report - Port Scan Attack
2020-08-01 02:55:34
118.89.16.139 attackbotsspam
Jul 31 19:57:02 vpn01 sshd[21160]: Failed password for root from 118.89.16.139 port 60256 ssh2
...
2020-08-01 03:03:33

Recently Reported IPs

247.87.237.15 71.182.42.95 26.171.220.233 5.237.199.173
241.251.111.139 227.38.63.170 245.216.126.211 72.31.225.121
6.139.148.10 21.67.153.59 73.134.152.95 52.19.228.60
38.87.192.148 87.242.21.28 247.195.90.235 64.100.183.46
59.62.199.162 190.61.253.81 252.157.103.196 125.183.177.3