Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Brampton

Region: Ontario

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.47.245.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.47.245.159.			IN	A

;; AUTHORITY SECTION:
.			372	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110701 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 08 17:53:43 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b'Host 159.245.47.142.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 159.245.47.142.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
109.124.65.86 attackbots
Dec 25 15:08:04 firewall sshd[13271]: Invalid user Olavi from 109.124.65.86
Dec 25 15:08:07 firewall sshd[13271]: Failed password for invalid user Olavi from 109.124.65.86 port 54492 ssh2
Dec 25 15:10:51 firewall sshd[13318]: Invalid user podger from 109.124.65.86
...
2019-12-26 02:26:34
202.154.180.51 attackbotsspam
Dec 25 14:51:57 ms-srv sshd[29109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.154.180.51
Dec 25 14:51:59 ms-srv sshd[29109]: Failed password for invalid user guedon from 202.154.180.51 port 43191 ssh2
2019-12-26 02:37:34
106.12.7.100 attackbotsspam
Dec 25 15:25:46 ns382633 sshd\[5814\]: Invalid user admin from 106.12.7.100 port 52246
Dec 25 15:25:46 ns382633 sshd\[5814\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.7.100
Dec 25 15:25:49 ns382633 sshd\[5814\]: Failed password for invalid user admin from 106.12.7.100 port 52246 ssh2
Dec 25 15:58:21 ns382633 sshd\[11045\]: Invalid user baechle from 106.12.7.100 port 41244
Dec 25 15:58:21 ns382633 sshd\[11045\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.7.100
2019-12-26 02:42:54
218.92.0.211 attackspam
Dec 25 18:45:11 eventyay sshd[32505]: Failed password for root from 218.92.0.211 port 63743 ssh2
Dec 25 18:46:58 eventyay sshd[32516]: Failed password for root from 218.92.0.211 port 20284 ssh2
...
2019-12-26 02:20:02
180.250.108.133 attackspambots
Repeated brute force against a port
2019-12-26 02:27:46
114.204.218.154 attackbots
Dec 25 11:44:15 askasleikir sshd[369167]: Failed password for root from 114.204.218.154 port 41119 ssh2
Dec 25 11:42:18 askasleikir sshd[369101]: Failed password for invalid user sekretariat from 114.204.218.154 port 60264 ssh2
Dec 25 11:26:57 askasleikir sshd[368623]: Failed password for invalid user jeanrenaud from 114.204.218.154 port 49886 ssh2
2019-12-26 02:54:25
103.219.112.48 attackspam
Dec 25 16:24:44 cvbnet sshd[25074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.219.112.48 
Dec 25 16:24:46 cvbnet sshd[25074]: Failed password for invalid user web from 103.219.112.48 port 50520 ssh2
...
2019-12-26 02:59:35
98.206.193.254 attack
SSH Brute Force
2019-12-26 02:34:08
103.78.81.227 attack
SSH/22 MH Probe, BF, Hack -
2019-12-26 02:43:57
104.168.250.71 attackspam
SSH/22 MH Probe, BF, Hack -
2019-12-26 02:29:41
190.211.92.24 attackspam
1577285528 - 12/25/2019 15:52:08 Host: 190.211.92.24/190.211.92.24 Port: 445 TCP Blocked
2019-12-26 02:31:53
185.245.96.83 attackbots
Invalid user uucp from 185.245.96.83 port 44530
2019-12-26 02:22:33
192.99.15.15 attackbots
$f2bV_matches
2019-12-26 02:58:19
91.104.226.239 attackspambots
Lines containing failures of 91.104.226.239
Dec 25 18:55:12 shared12 sshd[6099]: Invalid user mother from 91.104.226.239 port 54365
Dec 25 18:55:12 shared12 sshd[6099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.104.226.239
Dec 25 18:55:14 shared12 sshd[6099]: Failed password for invalid user mother from 91.104.226.239 port 54365 ssh2
Dec 25 18:55:15 shared12 sshd[6099]: Connection closed by invalid user mother 91.104.226.239 port 54365 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=91.104.226.239
2019-12-26 02:45:57
196.52.43.55 attack
ICMP MH Probe, Scan /Distributed -
2019-12-26 02:44:21

Recently Reported IPs

237.175.88.157 11.177.85.213 47.186.53.164 26.21.185.95
159.41.102.118 84.36.14.71 15.26.92.91 208.124.142.175
76.101.36.74 16.130.56.86 44.177.72.55 138.20.81.25
27.132.72.53 160.233.48.14 212.215.115.188 240.114.242.135
233.80.177.104 21.11.232.219 43.210.78.183 138.199.207.95