Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.69.205.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45894
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.69.205.121.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012101 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 04:19:59 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 121.205.69.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 142.69.205.121.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
64.227.37.95 attackspam
20 attempts against mh-ssh on leaf
2020-10-02 17:12:06
46.105.31.249 attack
Invalid user apache2 from 46.105.31.249 port 45928
2020-10-02 16:57:03
183.134.65.197 attack
" "
2020-10-02 17:02:37
2.57.122.116 attackbotsspam
 TCP (SYN) 2.57.122.116:47611 -> port 22, len 44
2020-10-02 16:59:22
51.77.146.156 attackbotsspam
Invalid user jeremiah from 51.77.146.156 port 59778
2020-10-02 17:04:04
103.154.234.245 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-02 17:32:31
192.241.235.192 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-10-02 17:25:00
201.20.170.186 attack
Oct  2 11:21:53 server sshd[25283]: Failed password for invalid user user from 201.20.170.186 port 47900 ssh2
Oct  2 11:31:51 server sshd[27284]: Failed password for invalid user tommy from 201.20.170.186 port 22398 ssh2
Oct  2 11:35:56 server sshd[28127]: Failed password for invalid user analytics from 201.20.170.186 port 28226 ssh2
2020-10-02 17:36:29
40.114.197.106 attackbotsspam
2020-10-01T22:44:04.044087mail.broermann.family sshd[8088]: Invalid user www from 40.114.197.106 port 60884
2020-10-01T22:44:04.049233mail.broermann.family sshd[8088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.114.197.106
2020-10-01T22:44:04.044087mail.broermann.family sshd[8088]: Invalid user www from 40.114.197.106 port 60884
2020-10-01T22:44:06.644814mail.broermann.family sshd[8088]: Failed password for invalid user www from 40.114.197.106 port 60884 ssh2
2020-10-01T22:48:17.971000mail.broermann.family sshd[8444]: Invalid user pepe from 40.114.197.106 port 42090
...
2020-10-02 17:14:41
85.109.70.98 attackspambots
SSH invalid-user multiple login attempts
2020-10-02 17:13:44
192.35.168.106 attackbotsspam
Port scan denied
2020-10-02 17:35:33
36.91.97.122 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-10-02 17:02:07
67.247.232.110 attackbotsspam
Oct  1 23:40:08 ift sshd\[21843\]: Failed password for invalid user admin from 67.247.232.110 port 54917 ssh2Oct  1 23:40:12 ift sshd\[21845\]: Failed password for invalid user admin from 67.247.232.110 port 55036 ssh2Oct  1 23:40:16 ift sshd\[21848\]: Failed password for invalid user admin from 67.247.232.110 port 55111 ssh2Oct  1 23:40:18 ift sshd\[21850\]: Failed password for invalid user admin from 67.247.232.110 port 55223 ssh2Oct  1 23:40:22 ift sshd\[21855\]: Failed password for invalid user admin from 67.247.232.110 port 55278 ssh2
...
2020-10-02 17:25:33
128.199.95.60 attackbotsspam
SSH BruteForce Attack
2020-10-02 17:27:00
212.70.149.20 attack
Oct  2 11:17:39 relay postfix/smtpd\[6440\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 11:18:03 relay postfix/smtpd\[2937\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 11:18:27 relay postfix/smtpd\[10262\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 11:18:51 relay postfix/smtpd\[10265\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct  2 11:19:16 relay postfix/smtpd\[6440\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-10-02 17:21:40

Recently Reported IPs

69.64.21.173 93.198.44.60 122.163.145.101 67.49.134.176
199.50.92.187 53.147.112.179 192.140.155.40 90.112.75.10
148.236.89.252 150.118.30.114 196.253.180.217 243.168.222.83
229.66.26.107 146.127.162.117 88.87.162.215 244.150.76.27
4.17.249.81 235.37.142.246 75.120.252.50 190.3.7.24