Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.78.43.8
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24893
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.78.43.8.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 01 00:02:04 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 8.43.78.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 8.43.78.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.30.123.216 attackbotsspam
Mar 12 09:31:24 ms-srv sshd[11637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.30.123.216  user=root
Mar 12 09:31:27 ms-srv sshd[11637]: Failed password for invalid user root from 193.30.123.216 port 50012 ssh2
2020-02-03 03:48:43
200.35.77.220 attack
Unauthorized connection attempt detected from IP address 200.35.77.220 to port 5555 [J]
2020-02-03 03:48:23
134.209.228.253 attack
Unauthorized connection attempt detected from IP address 134.209.228.253 to port 2220 [J]
2020-02-03 03:52:36
193.250.173.12 attackbots
Jan  9 18:01:49 ms-srv sshd[40465]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.250.173.12  user=root
Jan  9 18:01:51 ms-srv sshd[40465]: Failed password for invalid user root from 193.250.173.12 port 38748 ssh2
2020-02-03 03:57:00
193.68.57.155 attack
Sep  3 21:04:19 ms-srv sshd[37431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.68.57.155
Sep  3 21:04:21 ms-srv sshd[37431]: Failed password for invalid user spoj0 from 193.68.57.155 port 36026 ssh2
2020-02-03 03:45:46
193.254.135.252 attackbots
Unauthorized connection attempt detected from IP address 193.254.135.252 to port 2220 [J]
2020-02-03 03:50:55
220.246.209.71 attackspambots
Honeypot attack, port: 5555, PTR: n220246209071.netvigator.com.
2020-02-03 03:40:42
103.59.132.202 attackspam
Unauthorized connection attempt detected from IP address 103.59.132.202 to port 2220 [J]
2020-02-03 03:53:10
117.213.183.219 attackspam
DATE:2020-02-02 16:07:38, IP:117.213.183.219, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-02-03 03:39:51
193.77.81.3 attackbotsspam
$f2bV_matches
2020-02-03 03:17:58
193.80.166.174 attack
Aug 17 23:13:56 ms-srv sshd[57615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.80.166.174
Aug 17 23:13:58 ms-srv sshd[57615]: Failed password for invalid user toor from 193.80.166.174 port 50778 ssh2
2020-02-03 03:17:34
179.61.164.248 attackspam
(From eric@talkwithcustomer.com)  
Hey,

You have a website nervedoc.org, right?

Of course you do. I am looking at your website now.

It gets traffic every day – that you’re probably spending $2 / $4 / $10 or more a click to get.  Not including all of the work you put into creating social media, videos, blog posts, emails, and so on.

So you’re investing seriously in getting people to that site.

But how’s it working?  Great? Okay?  Not so much?

If that answer could be better, then it’s likely you’re putting a lot of time, effort, and money into an approach that’s not paying off like it should.

Now… imagine doubling your lead conversion in just minutes… In fact, I’ll go even better.
 
You could actually get up to 100X more conversions!

I’m not making this up.  As Chris Smith, best-selling author of The Conversion Code says: Speed is essential - there is a 100x decrease in Leads when a Lead is contacted within 14 minutes vs being contacted within 5 minutes.

He’s backed up by a study a
2020-02-03 03:39:13
179.61.172.248 attackbotsspam
(From eric@talkwithcustomer.com)  
Hey,

You have a website nervedoc.org, right?

Of course you do. I am looking at your website now.

It gets traffic every day – that you’re probably spending $2 / $4 / $10 or more a click to get.  Not including all of the work you put into creating social media, videos, blog posts, emails, and so on.

So you’re investing seriously in getting people to that site.

But how’s it working?  Great? Okay?  Not so much?

If that answer could be better, then it’s likely you’re putting a lot of time, effort, and money into an approach that’s not paying off like it should.

Now… imagine doubling your lead conversion in just minutes… In fact, I’ll go even better.
 
You could actually get up to 100X more conversions!

I’m not making this up.  As Chris Smith, best-selling author of The Conversion Code says: Speed is essential - there is a 100x decrease in Leads when a Lead is contacted within 14 minutes vs being contacted within 5 minutes.

He’s backed up by a study a
2020-02-03 03:31:19
193.77.216.143 attackbotsspam
Sep 25 11:04:26 ms-srv sshd[25990]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.77.216.143
Sep 25 11:04:28 ms-srv sshd[25990]: Failed password for invalid user firefox from 193.77.216.143 port 51816 ssh2
2020-02-03 03:18:55
5.63.13.164 attackspam
Feb 02 12:08:23 askasleikir sshd[79546]: Failed password for invalid user santin from 5.63.13.164 port 40436 ssh2
Feb 02 11:57:59 askasleikir sshd[79121]: Failed password for root from 5.63.13.164 port 52852 ssh2
Feb 02 12:06:35 askasleikir sshd[79480]: Failed password for invalid user ethos from 5.63.13.164 port 55596 ssh2
2020-02-03 03:24:06

Recently Reported IPs

225.15.12.119 215.237.66.109 226.51.97.105 147.95.72.24
52.211.227.162 139.154.150.100 241.76.6.255 198.142.140.165
237.104.177.220 3.254.129.1 117.89.52.123 2.223.48.230
44.116.87.215 141.135.21.35 169.131.221.15 87.193.57.11
201.231.151.27 254.66.113.120 148.96.102.147 33.201.248.55