Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.75.241.56
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10257
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;142.75.241.56.			IN	A

;; AUTHORITY SECTION:
.			432	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112301 1800 900 604800 86400

;; Query time: 89 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Nov 24 13:07:23 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 56.241.75.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 56.241.75.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
140.143.228.51 attackspambots
Feb 21 06:44:08 pi sshd[16260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.228.51 
Feb 21 06:44:11 pi sshd[16260]: Failed password for invalid user odoo from 140.143.228.51 port 45288 ssh2
2020-03-14 03:38:15
14.63.223.226 attackspam
Jan 13 05:08:37 pi sshd[8359]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.223.226 
Jan 13 05:08:38 pi sshd[8359]: Failed password for invalid user patrick from 14.63.223.226 port 46746 ssh2
2020-03-14 04:02:01
213.149.168.193 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-14 03:39:01
14.98.22.30 attackspam
Jan 11 11:02:11 pi sshd[28721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.22.30 
Jan 11 11:02:13 pi sshd[28721]: Failed password for invalid user w from 14.98.22.30 port 42516 ssh2
2020-03-14 03:58:33
49.235.73.150 attackspambots
2020-03-13T17:24:02.829347v22018076590370373 sshd[21202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.73.150  user=root
2020-03-13T17:24:04.404475v22018076590370373 sshd[21202]: Failed password for root from 49.235.73.150 port 46176 ssh2
2020-03-13T17:27:33.247683v22018076590370373 sshd[23093]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.73.150  user=root
2020-03-13T17:27:35.123837v22018076590370373 sshd[23093]: Failed password for root from 49.235.73.150 port 57394 ssh2
2020-03-13T17:38:21.477114v22018076590370373 sshd[32640]: Invalid user alexk from 49.235.73.150 port 34596
...
2020-03-14 03:32:02
63.250.41.235 attackbots
(sshd) Failed SSH login from 63.250.41.235 (US/United States/-): 10 in the last 3600 secs
2020-03-14 03:53:53
49.216.206.56 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-14 03:56:46
141.98.80.149 attackspam
Mar 14 04:02:20 bacztwo courieresmtpd[14896]: error,relay=::ffff:141.98.80.149,msg="535 Authentication failed.",cmd: AUTH PLAIN andcycle-w7club@andcycle.idv.tw
Mar 14 04:02:20 bacztwo courieresmtpd[14897]: error,relay=::ffff:141.98.80.149,msg="535 Authentication failed.",cmd: AUTH PLAIN andcycle-w7club@andcycle.idv.tw
Mar 14 04:02:20 bacztwo courieresmtpd[14898]: error,relay=::ffff:141.98.80.149,msg="535 Authentication failed.",cmd: AUTH PLAIN andcycle-bitcointalk.org@andcycle.idv.tw
Mar 14 04:02:22 bacztwo courieresmtpd[15179]: error,relay=::ffff:141.98.80.149,msg="535 Authentication failed.",cmd: AUTH PLAIN andcycle-w7club
Mar 14 04:02:22 bacztwo courieresmtpd[15180]: error,relay=::ffff:141.98.80.149,msg="535 Authentication failed.",cmd: AUTH PLAIN andcycle-w7club
...
2020-03-14 04:05:28
103.194.107.178 attackbots
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-14 04:06:16
140.143.204.21 attack
Jan  7 08:33:31 pi sshd[23148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.204.21 
Jan  7 08:33:33 pi sshd[23148]: Failed password for invalid user mkt from 140.143.204.21 port 63752 ssh2
2020-03-14 03:42:43
123.52.40.71 attack
1584103504 - 03/13/2020 13:45:04 Host: 123.52.40.71/123.52.40.71 Port: 445 TCP Blocked
2020-03-14 03:24:04
194.179.47.5 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-14 03:37:44
111.235.8.178 attack
HTTP/80/443/8080 Probe, BF, WP, Hack -
2020-03-14 03:39:41
182.61.185.1 attack
Mar 13 07:39:17 askasleikir sshd[124078]: Failed password for invalid user yli from 182.61.185.1 port 54250 ssh2
Mar 13 07:43:22 askasleikir sshd[124343]: Failed password for root from 182.61.185.1 port 40084 ssh2
Mar 13 07:35:05 askasleikir sshd[123848]: Failed password for root from 182.61.185.1 port 40146 ssh2
2020-03-14 03:32:29
140.143.193.52 attackbotsspam
Mar 13 10:43:39 ws22vmsma01 sshd[39866]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.193.52
Mar 13 10:43:41 ws22vmsma01 sshd[39866]: Failed password for invalid user proftpd from 140.143.193.52 port 52470 ssh2
...
2020-03-14 03:47:48

Recently Reported IPs

116.99.32.229 113.172.42.44 113.160.131.120 1.55.109.245
66.70.173.48 206.23.104.68 123.207.206.172 177.25.155.199
213.142.148.149 72.173.13.165 206.189.64.9 50.5.128.253
180.95.148.3 177.203.152.89 52.26.127.65 218.107.133.49
85.93.20.134 181.88.176.45 35.172.236.227 121.199.55.116