Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.67.99.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5353
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.67.99.136.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022700 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 27 19:53:20 CST 2025
;; MSG SIZE  rcvd: 106
Host info
136.99.67.142.in-addr.arpa domain name pointer host-142-67-99-136.public.eastlink.ca.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.99.67.142.in-addr.arpa	name = host-142-67-99-136.public.eastlink.ca.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.207.253.225 attackbots
Bruteforce on smtp
2019-07-24 09:25:58
109.0.197.237 attackbotsspam
Jul 24 02:57:12 OPSO sshd\[4957\]: Invalid user slr from 109.0.197.237 port 37722
Jul 24 02:57:12 OPSO sshd\[4957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.0.197.237
Jul 24 02:57:14 OPSO sshd\[4957\]: Failed password for invalid user slr from 109.0.197.237 port 37722 ssh2
Jul 24 03:01:44 OPSO sshd\[6109\]: Invalid user matias from 109.0.197.237 port 33814
Jul 24 03:01:44 OPSO sshd\[6109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.0.197.237
2019-07-24 09:03:25
81.192.159.130 attackbotsspam
Jul 24 02:33:53 h2177944 sshd\[6901\]: Invalid user trace from 81.192.159.130 port 57010
Jul 24 02:33:53 h2177944 sshd\[6901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.192.159.130
Jul 24 02:33:55 h2177944 sshd\[6901\]: Failed password for invalid user trace from 81.192.159.130 port 57010 ssh2
Jul 24 02:43:40 h2177944 sshd\[7642\]: Invalid user admin02 from 81.192.159.130 port 48648
...
2019-07-24 09:03:09
191.53.221.5 attackbots
Jul 23 16:14:25 web1 postfix/smtpd[28822]: warning: unknown[191.53.221.5]: SASL PLAIN authentication failed: authentication failure
...
2019-07-24 09:13:31
178.218.104.8 attackbots
proto=tcp  .  spt=35475  .  dpt=25  .     (listed on Blocklist de  Jul 23)     (1032)
2019-07-24 09:12:58
189.4.2.30 attackbotsspam
Automatic report - Port Scan Attack
2019-07-24 09:01:09
94.41.198.237 attackspambots
Jul 24 00:39:17 MK-Soft-VM5 sshd\[8840\]: Invalid user michi from 94.41.198.237 port 33197
Jul 24 00:39:17 MK-Soft-VM5 sshd\[8840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.41.198.237
Jul 24 00:39:19 MK-Soft-VM5 sshd\[8840\]: Failed password for invalid user michi from 94.41.198.237 port 33197 ssh2
...
2019-07-24 09:12:41
184.75.211.134 attack
(From pike.inez@gmail.com) Would you like to submit your business on 1000's of Advertising sites monthly? Pay one low monthly fee and get virtually unlimited traffic to your site forever!For more information just visit: http://post1000sofads.webhop.me
2019-07-24 09:09:52
45.23.108.9 attackbots
Jul 24 01:18:26 MK-Soft-VM7 sshd\[16619\]: Invalid user csgoserver from 45.23.108.9 port 47268
Jul 24 01:18:26 MK-Soft-VM7 sshd\[16619\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.23.108.9
Jul 24 01:18:29 MK-Soft-VM7 sshd\[16619\]: Failed password for invalid user csgoserver from 45.23.108.9 port 47268 ssh2
...
2019-07-24 09:19:18
92.255.197.74 attackspam
proto=tcp  .  spt=52624  .  dpt=25  .     (listed on Blocklist de  Jul 23)     (1024)
2019-07-24 09:26:19
119.96.157.243 attackspam
Jul 23 19:23:46 GIZ-Server-02 sshd[19913]: User r.r from 119.96.157.243 not allowed because not listed in AllowUsers
Jul 23 19:23:46 GIZ-Server-02 sshd[19913]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.157.243  user=r.r
Jul 23 19:23:48 GIZ-Server-02 sshd[19913]: Failed password for invalid user r.r from 119.96.157.243 port 59091 ssh2
Jul 23 19:23:48 GIZ-Server-02 sshd[19913]: Received disconnect from 119.96.157.243: 11: Bye Bye [preauth]
Jul 23 19:52:07 GIZ-Server-02 sshd[22393]: Connection closed by 119.96.157.243 [preauth]
Jul 23 19:53:17 GIZ-Server-02 sshd[22605]: Invalid user test from 119.96.157.243
Jul 23 19:53:17 GIZ-Server-02 sshd[22605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.96.157.243 
Jul 23 19:53:19 GIZ-Server-02 sshd[22605]: Failed password for invalid user test from 119.96.157.243 port 55651 ssh2
Jul 23 19:53:20 GIZ-Server-02 sshd[22605]: Received dis........
-------------------------------
2019-07-24 09:02:02
177.19.154.205 attack
proto=tcp  .  spt=43462  .  dpt=25  .     (listed on Dark List de Jul 23)     (1033)
2019-07-24 09:10:15
185.53.88.22 attack
\[2019-07-23 20:45:35\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-23T20:45:35.723-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9441144630211",SessionID="0x7f06f804c2c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/63309",ACLName="no_extension_match"
\[2019-07-23 20:46:53\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-23T20:46:53.271-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441144630211",SessionID="0x7f06f8009f28",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/52072",ACLName="no_extension_match"
\[2019-07-23 20:47:57\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-23T20:47:57.184-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441144630211",SessionID="0x7f06f804c2c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.22/54485",ACLName="no_exte
2019-07-24 09:04:43
185.216.140.52 attackbots
Splunk® : port scan detected:
Jul 23 18:30:55 testbed kernel: Firewall: *TCP_IN Blocked* IN=eth0 OUT= MAC=82:c6:52:d1:6e:53:c0:42:d0:39:2c:30:08:00 SRC=185.216.140.52 DST=104.248.11.191 LEN=40 TOS=0x00 PREC=0x00 TTL=245 ID=4021 PROTO=TCP SPT=40601 DPT=8089 WINDOW=1024 RES=0x00 SYN URGP=0
2019-07-24 09:33:39
103.112.44.46 attackbots
2019-07-23 15:13:56 H=(littleblackdress.it) [103.112.44.46]:38470 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-07-23 15:13:56 H=(littleblackdress.it) [103.112.44.46]:38470 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.3, 127.0.0.4) (https://www.spamhaus.org/sbl/query/SBLCSS)
2019-07-23 15:13:57 H=(littleblackdress.it) [103.112.44.46]:38470 I=[192.147.25.65]:25 F= rejected RCPT : RBL: found in thrukfz5b56tq6xao6odgdyjrq.zen.dq.spamhaus.net (127.0.0.4, 127.0.0.3) (https://www.spamhaus.org/query/ip/103.112.44.46)
...
2019-07-24 09:28:16

Recently Reported IPs

49.181.194.115 198.190.74.82 125.244.126.214 140.172.74.33
44.211.166.62 245.59.116.138 70.200.250.155 21.57.12.226
197.159.169.159 62.87.148.200 26.4.162.125 221.44.30.227
64.117.38.46 245.185.110.229 82.85.8.69 214.192.190.63
146.125.83.16 157.75.127.15 36.161.8.223 115.215.192.216