Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Calgary

Region: Alberta

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.5.194.168
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54607
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.5.194.168.			IN	A

;; AUTHORITY SECTION:
.			303	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020080201 1800 900 604800 86400

;; Query time: 76 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Aug 03 11:35:43 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 168.194.5.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 168.194.5.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
111.43.223.135 attackbotsspam
unauthorized connection attempt
2020-02-07 16:58:15
110.138.150.0 attackbotsspam
unauthorized connection attempt
2020-02-07 16:58:38
1.179.139.250 attackbotsspam
unauthorized connection attempt
2020-02-07 16:48:21
219.140.198.51 attackbotsspam
Feb  7 04:55:26 localhost sshd\[22935\]: Invalid user dwp from 219.140.198.51 port 40400
Feb  7 04:55:26 localhost sshd\[22935\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.140.198.51
Feb  7 04:55:28 localhost sshd\[22935\]: Failed password for invalid user dwp from 219.140.198.51 port 40400 ssh2
...
2020-02-07 16:42:12
5.202.144.172 attack
unauthorized connection attempt
2020-02-07 16:29:31
106.12.88.165 attackspambots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.165
Failed password for invalid user dwu from 106.12.88.165 port 41942 ssh2
Invalid user pam from 106.12.88.165 port 57058
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.88.165
Failed password for invalid user pam from 106.12.88.165 port 57058 ssh2
2020-02-07 16:45:53
213.186.141.52 attackspam
unauthorized connection attempt
2020-02-07 16:49:41
188.18.229.200 attackspambots
unauthorized connection attempt
2020-02-07 16:52:13
51.79.94.190 attack
unauthorized connection attempt
2020-02-07 16:39:53
114.35.140.192 attackbotsspam
unauthorized connection attempt
2020-02-07 16:56:46
115.58.132.234 attackbotsspam
unauthorized connection attempt
2020-02-07 16:27:48
203.175.66.139 attackspambots
unauthorized connection attempt
2020-02-07 16:50:14
189.235.240.139 attack
unauthorized connection attempt
2020-02-07 16:36:54
125.161.211.110 attackbotsspam
unauthorized connection attempt
2020-02-07 16:45:19
61.216.13.247 attackbots
unauthorized connection attempt
2020-02-07 17:03:50

Recently Reported IPs

45.125.112.90 154.28.188.38 123.30.81.161 139.64.238.125
174.72.51.75 177.154.51.54 167.250.140.142 169.217.159.43
175.69.190.175 13.174.212.6 156.74.42.180 37.137.36.127
160.50.42.226 38.207.66.64 139.184.93.30 91.145.100.177
185.240.175.187 119.117.105.241 112.13.40.84 85.85.32.118