Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.59.92.40
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21523
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.59.92.40.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 04:59:54 CST 2025
;; MSG SIZE  rcvd: 105
Host info
40.92.59.142.in-addr.arpa domain name pointer d142-59-92-40.abhsia.telus.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
40.92.59.142.in-addr.arpa	name = d142-59-92-40.abhsia.telus.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
115.159.65.195 attackbotsspam
Invalid user knn from 115.159.65.195 port 41252
2020-05-01 13:43:28
94.177.225.152 attackspam
Invalid user px from 94.177.225.152 port 58524
2020-05-01 13:16:09
195.46.187.229 attackspam
May  1 06:16:00 prox sshd[21329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.46.187.229 
May  1 06:16:02 prox sshd[21329]: Failed password for invalid user admin from 195.46.187.229 port 53218 ssh2
2020-05-01 13:27:58
206.189.151.212 attack
Invalid user postgres from 206.189.151.212 port 46182
2020-05-01 13:25:26
45.7.138.40 attackbotsspam
May  1 04:52:08 vlre-nyc-1 sshd\[10348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.138.40  user=root
May  1 04:52:10 vlre-nyc-1 sshd\[10348\]: Failed password for root from 45.7.138.40 port 49180 ssh2
May  1 04:56:02 vlre-nyc-1 sshd\[10515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.7.138.40  user=root
May  1 04:56:05 vlre-nyc-1 sshd\[10515\]: Failed password for root from 45.7.138.40 port 55003 ssh2
May  1 05:00:06 vlre-nyc-1 sshd\[10704\]: Invalid user feng from 45.7.138.40
...
2020-05-01 13:54:04
64.227.54.28 attack
Invalid user deploy from 64.227.54.28 port 42750
2020-05-01 13:51:25
212.64.23.30 attackspambots
Invalid user debian from 212.64.23.30 port 34916
2020-05-01 13:24:12
107.170.57.221 attackbotsspam
May  1 06:14:39 sso sshd[20821]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.57.221
May  1 06:14:41 sso sshd[20821]: Failed password for invalid user riza from 107.170.57.221 port 42415 ssh2
...
2020-05-01 13:48:25
212.95.137.164 attack
Apr 30 12:47:46 sip sshd[16108]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.95.137.164
Apr 30 12:47:48 sip sshd[16108]: Failed password for invalid user abel from 212.95.137.164 port 46264 ssh2
May  1 06:36:45 sip sshd[23275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.95.137.164
2020-05-01 13:23:48
106.12.138.226 attack
Invalid user testuser from 106.12.138.226 port 35242
2020-05-01 13:15:57
106.54.121.117 attackspambots
May  1 10:11:28 gw1 sshd[24994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.54.121.117
May  1 10:11:30 gw1 sshd[24994]: Failed password for invalid user qz from 106.54.121.117 port 59874 ssh2
...
2020-05-01 13:15:21
119.29.152.172 attack
Invalid user wallace from 119.29.152.172 port 50950
2020-05-01 13:42:26
60.216.86.130 attack
Invalid user aric from 60.216.86.130 port 44454
2020-05-01 13:18:11
106.13.29.200 attackbots
Invalid user guido from 106.13.29.200 port 42502
2020-05-01 13:49:11
202.149.89.84 attack
Invalid user loya from 202.149.89.84 port 43505
2020-05-01 13:25:48

Recently Reported IPs

197.41.15.192 193.80.47.136 48.226.226.166 240.251.239.80
233.65.26.9 64.71.145.21 213.174.253.190 151.145.118.194
68.18.0.226 184.193.247.189 30.252.21.9 128.237.76.133
224.88.196.118 208.247.141.47 55.194.19.194 164.138.129.214
9.35.242.107 142.130.33.39 250.34.46.162 58.211.192.84