Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.6.92.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.6.92.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 00:10:34 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 21.92.6.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 142.6.92.21.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
51.75.171.29 attackspam
Sep 20 14:12:56 SilenceServices sshd[23119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.171.29
Sep 20 14:12:59 SilenceServices sshd[23119]: Failed password for invalid user danny from 51.75.171.29 port 60798 ssh2
Sep 20 14:16:44 SilenceServices sshd[24532]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.171.29
2019-09-20 23:24:32
107.155.49.126 attack
Sep 20 15:28:32 hosting sshd[6028]: Invalid user 0 from 107.155.49.126 port 38852
Sep 20 15:28:32 hosting sshd[6028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.155.49.126
Sep 20 15:28:32 hosting sshd[6028]: Invalid user 0 from 107.155.49.126 port 38852
Sep 20 15:28:34 hosting sshd[6028]: Failed password for invalid user 0 from 107.155.49.126 port 38852 ssh2
Sep 20 15:28:37 hosting sshd[6030]: Invalid user 101 from 107.155.49.126 port 40194
...
2019-09-20 23:18:51
210.96.71.209 attack
Sep 20 18:23:12 www sshd\[51129\]: Invalid user y from 210.96.71.209
Sep 20 18:23:12 www sshd\[51129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.96.71.209
Sep 20 18:23:13 www sshd\[51129\]: Failed password for invalid user y from 210.96.71.209 port 46216 ssh2
...
2019-09-20 23:26:02
201.179.131.221 attackbotsspam
[Fri Sep 20 06:14:41.669907 2019] [:error] [pid 140503] [client 201.179.131.221:46336] [client 201.179.131.221] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "91"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 18)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "127.0.0.1"] [uri "/cgi-bin/ViewLog.asp"] [unique_id "XYSYgdL8pc4ymx2GDZgFNgAAAAA"]
...
2019-09-20 23:25:00
114.98.27.244 attackspam
2019-09-20T10:14:37.528433beta postfix/smtpd[30343]: warning: unknown[114.98.27.244]: SASL LOGIN authentication failed: authentication failure
2019-09-20T10:14:44.874822beta postfix/smtpd[30345]: warning: unknown[114.98.27.244]: SASL LOGIN authentication failed: authentication failure
2019-09-20T10:14:51.025286beta postfix/smtpd[30343]: warning: unknown[114.98.27.244]: SASL LOGIN authentication failed: authentication failure
...
2019-09-20 23:18:36
23.31.99.4 attack
Multiple failed RDP login attempts
2019-09-20 23:41:15
179.176.153.45 attackspam
Automatic report - Port Scan Attack
2019-09-20 23:39:22
58.254.132.41 attack
Sep 20 00:51:06 auw2 sshd\[6400\]: Invalid user default from 58.254.132.41
Sep 20 00:51:06 auw2 sshd\[6400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.41
Sep 20 00:51:07 auw2 sshd\[6400\]: Failed password for invalid user default from 58.254.132.41 port 58788 ssh2
Sep 20 00:56:10 auw2 sshd\[6766\]: Invalid user mike from 58.254.132.41
Sep 20 00:56:10 auw2 sshd\[6766\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.254.132.41
2019-09-20 23:19:14
213.166.70.101 attack
09/20/2019-06:51:42.986149 213.166.70.101 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-20 23:59:18
182.61.130.121 attackbots
Sep 20 15:06:23 hcbbdb sshd\[9616\]: Invalid user ftpuser from 182.61.130.121
Sep 20 15:06:23 hcbbdb sshd\[9616\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.130.121
Sep 20 15:06:25 hcbbdb sshd\[9616\]: Failed password for invalid user ftpuser from 182.61.130.121 port 32867 ssh2
Sep 20 15:11:59 hcbbdb sshd\[10198\]: Invalid user oracle from 182.61.130.121
Sep 20 15:11:59 hcbbdb sshd\[10198\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.130.121
2019-09-20 23:18:08
176.159.245.147 attackbots
$f2bV_matches
2019-09-20 23:43:17
103.228.112.53 attackbotsspam
Sep 20 11:09:19 tux-35-217 sshd\[16166\]: Invalid user rochelle from 103.228.112.53 port 52358
Sep 20 11:09:19 tux-35-217 sshd\[16166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.112.53
Sep 20 11:09:21 tux-35-217 sshd\[16166\]: Failed password for invalid user rochelle from 103.228.112.53 port 52358 ssh2
Sep 20 11:14:06 tux-35-217 sshd\[16196\]: Invalid user fagan from 103.228.112.53 port 35524
Sep 20 11:14:06 tux-35-217 sshd\[16196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.228.112.53
...
2019-09-20 23:55:06
222.186.52.78 attackbots
scan r
2019-09-20 23:21:24
35.180.198.186 attackbotsspam
35.180.198.186 - - \[20/Sep/2019:11:14:46 +0200\] "GET http://chek.zennolab.com/proxy.php HTTP/1.1" 404 47 "RefererString" "Mozilla/5.0 \(Windows NT 10.0\; WOW64\; rv:45.0\) Gecko/20100101 Firefox/45.0"
...
2019-09-20 23:19:43
165.22.218.11 attack
22/tcp 22/tcp 22/tcp...
[2019-09-15/19]6pkt,1pt.(tcp)
2019-09-20 23:28:21

Recently Reported IPs

68.135.32.195 239.17.241.38 110.46.174.160 226.214.71.21
24.77.101.1 161.172.250.28 198.182.153.214 49.151.109.75
190.209.32.8 165.107.167.13 206.112.231.22 150.212.232.129
100.90.14.197 129.191.62.243 234.224.31.63 81.22.51.94
204.199.130.37 236.72.123.101 5.251.51.74 239.183.13.121