Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.66.59.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8379
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.66.59.240.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061503 1800 900 604800 86400

;; Query time: 98 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 16 06:50:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 240.59.66.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 240.59.66.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.151.157.210 attackspam
20 attempts against mh-misbehave-ban on pluto
2020-08-31 13:16:14
51.91.77.109 attackspambots
Aug 31 12:15:38 webhost01 sshd[18209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.77.109
Aug 31 12:15:40 webhost01 sshd[18209]: Failed password for invalid user steam from 51.91.77.109 port 45616 ssh2
...
2020-08-31 13:29:34
220.135.34.207 attackbots
Unauthorised access (Aug 31) SRC=220.135.34.207 LEN=40 TTL=46 ID=31656 TCP DPT=23 WINDOW=16383 SYN
2020-08-31 13:46:16
189.91.4.240 attack
(smtpauth) Failed SMTP AUTH login from 189.91.4.240 (BR/Brazil/189-91-4-240.dvl-wr.mastercabo.com.br): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-08-31 08:28:18 plain authenticator failed for ([189.91.4.240]) [189.91.4.240]: 535 Incorrect authentication data (set_id=fd2302)
2020-08-31 13:01:47
80.82.78.100 attack
 UDP 80.82.78.100:44484 -> port 1541, len 57
2020-08-31 13:40:01
218.92.0.223 attackbotsspam
Aug 31 07:15:56 plg sshd[25957]: Failed none for invalid user root from 218.92.0.223 port 60602 ssh2
Aug 31 07:15:57 plg sshd[25957]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.223  user=root
Aug 31 07:15:58 plg sshd[25957]: Failed password for invalid user root from 218.92.0.223 port 60602 ssh2
Aug 31 07:16:02 plg sshd[25957]: Failed password for invalid user root from 218.92.0.223 port 60602 ssh2
Aug 31 07:16:06 plg sshd[25957]: Failed password for invalid user root from 218.92.0.223 port 60602 ssh2
Aug 31 07:16:10 plg sshd[25957]: Failed password for invalid user root from 218.92.0.223 port 60602 ssh2
Aug 31 07:16:14 plg sshd[25957]: Failed password for invalid user root from 218.92.0.223 port 60602 ssh2
Aug 31 07:16:14 plg sshd[25957]: error: maximum authentication attempts exceeded for invalid user root from 218.92.0.223 port 60602 ssh2 [preauth]
...
2020-08-31 13:43:17
91.245.30.71 attackspambots
Brute force attempt
2020-08-31 13:04:59
202.104.112.217 attack
Aug 31 05:02:09 vps-51d81928 sshd[123453]: Failed password for root from 202.104.112.217 port 43107 ssh2
Aug 31 05:04:24 vps-51d81928 sshd[123461]: Invalid user ajay from 202.104.112.217 port 55021
Aug 31 05:04:24 vps-51d81928 sshd[123461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.104.112.217 
Aug 31 05:04:24 vps-51d81928 sshd[123461]: Invalid user ajay from 202.104.112.217 port 55021
Aug 31 05:04:26 vps-51d81928 sshd[123461]: Failed password for invalid user ajay from 202.104.112.217 port 55021 ssh2
...
2020-08-31 13:18:37
192.35.168.235 attackspambots
9055/tcp 9533/tcp 3384/tcp...
[2020-06-30/08-31]303pkt,263pt.(tcp)
2020-08-31 13:25:15
134.209.249.204 attack
Aug 30 22:08:33 dignus sshd[3332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.249.204
Aug 30 22:08:34 dignus sshd[3332]: Failed password for invalid user oracle from 134.209.249.204 port 59862 ssh2
Aug 30 22:08:47 dignus sshd[3356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.249.204  user=root
Aug 30 22:08:49 dignus sshd[3356]: Failed password for root from 134.209.249.204 port 47976 ssh2
Aug 30 22:09:01 dignus sshd[3382]: Invalid user postgres from 134.209.249.204 port 36088
...
2020-08-31 13:17:37
185.234.219.85 attackbots
 TCP (SYN) 185.234.219.85:6000 -> port 1433, len 40
2020-08-31 13:15:22
182.137.60.207 attack
spam (f2b h2)
2020-08-31 13:21:33
49.235.92.208 attack
Aug 31 04:08:38 game-panel sshd[6570]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.208
Aug 31 04:08:41 game-panel sshd[6570]: Failed password for invalid user francois from 49.235.92.208 port 41886 ssh2
Aug 31 04:14:01 game-panel sshd[6960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.92.208
2020-08-31 13:12:12
178.32.219.66 attackbots
Aug 31 06:16:13 ajax sshd[7971]: Failed password for root from 178.32.219.66 port 33016 ssh2
2020-08-31 13:44:54
114.34.199.225 attackbotsspam
Unauthorised access (Aug 31) SRC=114.34.199.225 LEN=44 TTL=44 ID=18966 TCP DPT=8080 WINDOW=51825 SYN
2020-08-31 13:06:15

Recently Reported IPs

38.74.11.64 38.74.11.69 38.74.11.160 38.87.234.242
38.93.235.217 38.102.79.123 45.13.229.23 45.14.173.197
78.84.70.245 253.222.120.151 36.80.23.106 45.15.162.31
45.15.16.182 45.32.5.16 45.32.12.52 45.32.27.222
45.32.33.117 42.203.38.84 42.238.82.233 45.32.65.196