Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.75.28.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18376
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.75.28.220.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020300 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 13:49:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 220.28.75.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.28.75.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
77.42.120.166 attackspam
Automatic report - Port Scan Attack
2019-12-20 03:33:38
87.101.39.214 attack
SSH bruteforce
2019-12-20 03:52:08
46.38.144.17 attack
Dec 19 20:41:35 relay postfix/smtpd\[31433\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 19 20:42:20 relay postfix/smtpd\[3268\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 19 20:43:00 relay postfix/smtpd\[31433\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 19 20:43:48 relay postfix/smtpd\[4381\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec 19 20:44:32 relay postfix/smtpd\[8893\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-20 03:53:06
23.129.64.202 attack
Dec 19 20:50:34 vpn01 sshd[1158]: Failed password for root from 23.129.64.202 port 33198 ssh2
Dec 19 20:50:36 vpn01 sshd[1158]: Failed password for root from 23.129.64.202 port 33198 ssh2
...
2019-12-20 03:57:37
121.78.129.147 attackspam
Dec 20 00:35:50 gw1 sshd[2626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.78.129.147
Dec 20 00:35:51 gw1 sshd[2626]: Failed password for invalid user blaster from 121.78.129.147 port 56816 ssh2
...
2019-12-20 04:01:17
186.194.120.133 attackspam
Unauthorized connection attempt detected from IP address 186.194.120.133 to port 445
2019-12-20 03:41:55
163.172.82.142 attackbotsspam
recursive dns scanning
2019-12-20 03:49:40
79.99.109.54 attackspam
1576766051 - 12/19/2019 15:34:11 Host: 79.99.109.54/79.99.109.54 Port: 445 TCP Blocked
2019-12-20 03:34:59
222.186.180.17 attackbotsspam
Dec 19 20:55:40 loxhost sshd\[24772\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Dec 19 20:55:42 loxhost sshd\[24772\]: Failed password for root from 222.186.180.17 port 18018 ssh2
Dec 19 20:55:46 loxhost sshd\[24772\]: Failed password for root from 222.186.180.17 port 18018 ssh2
Dec 19 20:55:50 loxhost sshd\[24772\]: Failed password for root from 222.186.180.17 port 18018 ssh2
Dec 19 20:55:52 loxhost sshd\[24772\]: Failed password for root from 222.186.180.17 port 18018 ssh2
...
2019-12-20 04:04:11
27.128.233.104 attackspam
Dec 19 19:44:51 eventyay sshd[23413]: Failed password for root from 27.128.233.104 port 37230 ssh2
Dec 19 19:49:38 eventyay sshd[23553]: Failed password for root from 27.128.233.104 port 59618 ssh2
Dec 19 19:54:25 eventyay sshd[23693]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.233.104
...
2019-12-20 04:00:30
187.141.128.42 attack
Dec 19 19:43:09 pi sshd\[3897\]: Invalid user leonid from 187.141.128.42 port 48266
Dec 19 19:43:09 pi sshd\[3897\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.141.128.42
Dec 19 19:43:11 pi sshd\[3897\]: Failed password for invalid user leonid from 187.141.128.42 port 48266 ssh2
Dec 19 19:49:23 pi sshd\[4129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.141.128.42  user=root
Dec 19 19:49:25 pi sshd\[4129\]: Failed password for root from 187.141.128.42 port 47634 ssh2
...
2019-12-20 03:53:53
104.211.216.173 attackspam
Dec 19 06:39:56 hpm sshd\[4583\]: Invalid user wwwadmin from 104.211.216.173
Dec 19 06:39:56 hpm sshd\[4583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.216.173
Dec 19 06:39:58 hpm sshd\[4583\]: Failed password for invalid user wwwadmin from 104.211.216.173 port 40988 ssh2
Dec 19 06:46:18 hpm sshd\[5237\]: Invalid user meubus from 104.211.216.173
Dec 19 06:46:18 hpm sshd\[5237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.211.216.173
2019-12-20 03:26:45
61.76.173.244 attackspam
Dec 19 08:34:26 kapalua sshd\[1196\]: Invalid user named from 61.76.173.244
Dec 19 08:34:26 kapalua sshd\[1196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.173.244
Dec 19 08:34:28 kapalua sshd\[1196\]: Failed password for invalid user named from 61.76.173.244 port 31433 ssh2
Dec 19 08:40:41 kapalua sshd\[1913\]: Invalid user schuh from 61.76.173.244
Dec 19 08:40:41 kapalua sshd\[1913\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.76.173.244
2019-12-20 03:55:52
187.142.44.154 attackspam
Automatic report - Port Scan Attack
2019-12-20 04:00:17
222.186.175.167 attackspam
Dec 19 20:43:58 mail sshd\[10436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Dec 19 20:43:59 mail sshd\[10436\]: Failed password for root from 222.186.175.167 port 29518 ssh2
Dec 19 20:44:16 mail sshd\[10438\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
...
2019-12-20 03:50:21

Recently Reported IPs

213.252.149.164 58.56.53.74 73.118.25.224 225.58.186.144
12.121.51.84 213.205.14.20 239.188.45.214 196.148.160.104
37.217.253.76 189.207.112.229 40.75.190.127 96.244.14.245
4.200.54.62 39.233.240.86 232.53.113.120 36.122.117.210
140.60.11.79 34.151.142.141 210.212.190.127 89.129.173.81