Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.58.159.227
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49682
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.58.159.227.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030101 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 02 13:29:14 CST 2025
;; MSG SIZE  rcvd: 107
Host info
227.159.58.142.in-addr.arpa domain name pointer bby-pjh-bridge-1.net.sfu.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
227.159.58.142.in-addr.arpa	name = bby-pjh-bridge-1.net.sfu.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
146.185.183.65 attack
Nov 22 13:19:12 svp-01120 sshd[30265]: Failed password for root from 146.185.183.65 port 46430 ssh2
Nov 22 13:22:54 svp-01120 sshd[1641]: Invalid user wwwrun from 146.185.183.65
Nov 22 13:22:54 svp-01120 sshd[1641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=146.185.183.65
Nov 22 13:22:54 svp-01120 sshd[1641]: Invalid user wwwrun from 146.185.183.65
Nov 22 13:22:56 svp-01120 sshd[1641]: Failed password for invalid user wwwrun from 146.185.183.65 port 54004 ssh2
...
2019-11-23 02:39:40
138.94.114.238 attack
Nov 22 04:43:45 kapalua sshd\[13232\]: Invalid user test from 138.94.114.238
Nov 22 04:43:45 kapalua sshd\[13232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.94.114.238
Nov 22 04:43:47 kapalua sshd\[13232\]: Failed password for invalid user test from 138.94.114.238 port 40080 ssh2
Nov 22 04:48:21 kapalua sshd\[13644\]: Invalid user admin from 138.94.114.238
Nov 22 04:48:21 kapalua sshd\[13644\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.94.114.238
2019-11-23 02:40:23
119.159.144.221 attack
Unauthorized connection attempt from IP address 119.159.144.221 on Port 445(SMB)
2019-11-23 02:25:20
183.15.90.100 attackspambots
Telnet/23 MH Probe, BF, Hack -
2019-11-23 02:40:10
157.230.133.15 attack
Invalid user caswell from 157.230.133.15 port 50742
2019-11-23 02:43:59
201.189.170.78 attack
Telnet/23 MH Probe, BF, Hack -
2019-11-23 02:28:26
183.89.215.120 attack
Nov 22 15:48:20 woltan sshd[26823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.89.215.120
2019-11-23 02:41:09
118.173.49.221 attackspam
Telnet/23 MH Probe, BF, Hack -
2019-11-23 02:50:08
127.0.0.1 attackbots
Test Connectivity
2019-11-23 02:36:04
200.206.194.111 attackbotsspam
Telnet/23 MH Probe, BF, Hack -
2019-11-23 02:32:44
196.52.43.65 attack
Port scan: Attack repeated for 24 hours
2019-11-23 02:51:56
185.175.93.103 attackspambots
firewall-block, port(s): 3456/tcp
2019-11-23 02:52:21
190.46.157.140 attack
Nov 22 14:59:04 marvibiene sshd[45250]: Invalid user duncan02 from 190.46.157.140 port 38652
Nov 22 14:59:04 marvibiene sshd[45250]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.46.157.140
Nov 22 14:59:04 marvibiene sshd[45250]: Invalid user duncan02 from 190.46.157.140 port 38652
Nov 22 14:59:06 marvibiene sshd[45250]: Failed password for invalid user duncan02 from 190.46.157.140 port 38652 ssh2
...
2019-11-23 02:39:20
60.190.137.12 attackbotsspam
Unauthorized connection attempt from IP address 60.190.137.12 on Port 445(SMB)
2019-11-23 02:30:26
103.21.12.132 attack
Unauthorized connection attempt from IP address 103.21.12.132 on Port 445(SMB)
2019-11-23 02:41:29

Recently Reported IPs

244.97.191.107 151.255.133.164 5.115.135.248 16.87.66.242
172.232.85.55 57.93.146.236 162.218.6.100 37.200.29.98
125.195.96.31 127.166.79.128 83.101.87.154 239.224.170.12
146.46.109.103 195.234.133.165 234.50.252.215 222.215.220.153
233.150.114.91 83.142.211.115 185.74.2.121 254.252.178.122