Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.64.109.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 703
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.64.109.203.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 09:12:41 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 203.109.64.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 203.109.64.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.197.185.188 attackbotsspam
May  8 14:11:46 vps647732 sshd[17480]: Failed password for root from 138.197.185.188 port 38064 ssh2
May  8 14:15:47 vps647732 sshd[17559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.185.188
...
2020-05-08 20:38:53
123.27.169.108 attackspam
Unauthorized connection attempt from IP address 123.27.169.108 on Port 445(SMB)
2020-05-08 20:45:51
45.162.230.2 attackspam
08.05.2020 14:15:25 - RDP Login Fail Detected by 
https://www.elinox.de/RDP-Wächter
2020-05-08 21:10:45
190.143.202.194 attackspambots
Unauthorized connection attempt from IP address 190.143.202.194 on Port 445(SMB)
2020-05-08 20:35:25
182.253.68.122 attackspambots
May  8 12:48:58 game-panel sshd[25279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.68.122
May  8 12:49:00 game-panel sshd[25279]: Failed password for invalid user test11 from 182.253.68.122 port 55376 ssh2
May  8 12:54:35 game-panel sshd[25470]: Failed password for root from 182.253.68.122 port 36058 ssh2
2020-05-08 21:03:51
14.242.85.98 attackbotsspam
Unauthorized connection attempt from IP address 14.242.85.98 on Port 445(SMB)
2020-05-08 20:34:15
64.145.94.159 attackspam
(From zoeramzy06@gmail.com) Hi,

How are you doing? I aim to provide you a high quality, free of cost guest post article for your amazing website. I can send you some really great topic ideas for this purpose which would be relevant to your website niche for sure.

If my topic ideas happen to appeal you, I’ll send over the article. I would just need a backlink in return of the article. The backlink needs to be within the body of the article.

Please let me know your response to this, if I shall send topic ideas?

Looking forward.

Regards.

Zoe Ramzy
2020-05-08 20:53:06
195.54.160.243 attack
May  8 14:31:11 debian-2gb-nbg1-2 kernel: \[11199951.856066\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.160.243 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=12510 PROTO=TCP SPT=58124 DPT=12472 WINDOW=1024 RES=0x00 SYN URGP=0
2020-05-08 20:32:15
72.164.246.194 attackbots
Unauthorized connection attempt from IP address 72.164.246.194 on Port 445(SMB)
2020-05-08 21:08:55
54.37.224.163 attackbotsspam
May  8 14:11:50 electroncash sshd[33165]: Invalid user guest from 54.37.224.163 port 50288
May  8 14:11:50 electroncash sshd[33165]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.224.163 
May  8 14:11:50 electroncash sshd[33165]: Invalid user guest from 54.37.224.163 port 50288
May  8 14:11:51 electroncash sshd[33165]: Failed password for invalid user guest from 54.37.224.163 port 50288 ssh2
May  8 14:15:43 electroncash sshd[34237]: Invalid user adrian from 54.37.224.163 port 59640
...
2020-05-08 20:45:14
198.108.67.52 attack
05/08/2020-08:15:35.933082 198.108.67.52 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-05-08 20:55:05
64.225.25.59 attackspambots
May  8 14:11:28 minden010 sshd[22099]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.25.59
May  8 14:11:30 minden010 sshd[22099]: Failed password for invalid user reception from 64.225.25.59 port 45870 ssh2
May  8 14:15:45 minden010 sshd[23634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.225.25.59
...
2020-05-08 20:42:33
106.12.22.209 attackbots
May  8 14:57:54 MainVPS sshd[2612]: Invalid user monkey from 106.12.22.209 port 33822
May  8 14:57:54 MainVPS sshd[2612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.22.209
May  8 14:57:54 MainVPS sshd[2612]: Invalid user monkey from 106.12.22.209 port 33822
May  8 14:57:56 MainVPS sshd[2612]: Failed password for invalid user monkey from 106.12.22.209 port 33822 ssh2
May  8 14:59:56 MainVPS sshd[4249]: Invalid user control from 106.12.22.209 port 54906
...
2020-05-08 21:12:19
223.75.229.135 attackspam
1588940128 - 05/08/2020 19:15:28 Host: 223.75.229.135/223.75.229.135 Port: 8080 TCP Blocked
...
2020-05-08 21:03:37
36.90.252.81 attackbotsspam
1588941732 - 05/08/2020 14:42:12 Host: 36.90.252.81/36.90.252.81 Port: 445 TCP Blocked
2020-05-08 21:00:14

Recently Reported IPs

95.12.16.239 247.23.211.181 74.69.215.146 94.250.239.117
187.109.231.255 159.176.44.167 97.110.86.5 3.109.78.4
173.251.173.18 114.39.45.229 19.138.21.171 6.249.55.189
32.249.123.44 144.42.237.127 76.84.71.235 203.220.18.214
71.135.85.161 245.245.45.93 153.210.71.74 219.142.190.247