Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Charlottetown

Region: Prince Edward Island

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       142.87.0.0 - 142.87.255.255
CIDR:           142.87.0.0/16
NetName:        HCS-NET
NetHandle:      NET-142-87-0-0-1
Parent:         NET142 (NET-142-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Holland College (HOLLAN-1-Z)
RegDate:        1993-04-21
Updated:        2022-07-20
Ref:            https://rdap.arin.net/registry/ip/142.87.0.0


OrgName:        Holland College
OrgId:          HOLLAN-1-Z
Address:        140 Weymouth St.
City:           Charlottetown
StateProv:      PE
PostalCode:     C1A 4Z1
Country:        CA
RegDate:        2022-07-12
Updated:        2023-07-06
Ref:            https://rdap.arin.net/registry/entity/HOLLAN-1-Z


OrgTechHandle: GCM12-ARIN
OrgTechName:   Mermuys, Greg C
OrgTechPhone:  +1-902-566-9625 
OrgTechEmail:  gmermuys@hollandcollege.com
OrgTechRef:    https://rdap.arin.net/registry/entity/GCM12-ARIN

OrgNOCHandle: GCM12-ARIN
OrgNOCName:   Mermuys, Greg C
OrgNOCPhone:  +1-902-566-9625 
OrgNOCEmail:  gmermuys@hollandcollege.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/GCM12-ARIN

OrgAbuseHandle: GCM12-ARIN
OrgAbuseName:   Mermuys, Greg C
OrgAbusePhone:  +1-902-566-9625 
OrgAbuseEmail:  gmermuys@hollandcollege.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GCM12-ARIN

RNOCHandle: GCM12-ARIN
RNOCName:   Mermuys, Greg C
RNOCPhone:  +1-902-566-9625 
RNOCEmail:  gmermuys@hollandcollege.com
RNOCRef:    https://rdap.arin.net/registry/entity/GCM12-ARIN

RAbuseHandle: GCM12-ARIN
RAbuseName:   Mermuys, Greg C
RAbusePhone:  +1-902-566-9625 
RAbuseEmail:  gmermuys@hollandcollege.com
RAbuseRef:    https://rdap.arin.net/registry/entity/GCM12-ARIN

RTechHandle: GCM12-ARIN
RTechName:   Mermuys, Greg C
RTechPhone:  +1-902-566-9625 
RTechEmail:  gmermuys@hollandcollege.com
RTechRef:    https://rdap.arin.net/registry/entity/GCM12-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.87.249.209
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8397
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.87.249.209.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032000 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 21 01:01:08 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 209.249.87.142.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 209.249.87.142.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.170.44.137 attackbots
Automatic report - XMLRPC Attack
2019-11-17 17:39:20
157.52.255.126 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-17 17:46:27
149.56.96.78 attackspambots
3x Failed Password
2019-11-17 17:28:29
90.177.244.100 attackspam
1573971918 - 11/17/2019 07:25:18 Host: 90.177.244.100/90.177.244.100 Port: 8080 TCP Blocked
2019-11-17 17:59:02
181.49.117.166 attack
Nov 17 07:51:19 nextcloud sshd\[23781\]: Invalid user hb4 from 181.49.117.166
Nov 17 07:51:19 nextcloud sshd\[23781\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.49.117.166
Nov 17 07:51:20 nextcloud sshd\[23781\]: Failed password for invalid user hb4 from 181.49.117.166 port 42206 ssh2
...
2019-11-17 17:38:46
89.34.25.245 attack
Automatic report - XMLRPC Attack
2019-11-17 17:42:24
184.30.210.217 attack
11/17/2019-10:23:29.354383 184.30.210.217 Protocol: 6 SURICATA TLS invalid record/traffic
2019-11-17 17:40:44
163.172.181.123 attack
Honeypot attack, port: 23, PTR: 123-181-172-163.rev.cloud.scaleway.com.
2019-11-17 17:27:55
129.154.67.65 attackspam
Nov 17 09:03:45 web8 sshd\[29711\]: Invalid user test from 129.154.67.65
Nov 17 09:03:45 web8 sshd\[29711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.67.65
Nov 17 09:03:47 web8 sshd\[29711\]: Failed password for invalid user test from 129.154.67.65 port 36259 ssh2
Nov 17 09:08:10 web8 sshd\[31765\]: Invalid user vq from 129.154.67.65
Nov 17 09:08:10 web8 sshd\[31765\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.154.67.65
2019-11-17 17:29:55
81.22.45.133 attackspambots
2019-11-17T10:18:56.128451+01:00 lumpi kernel: [3804707.295394] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.133 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=5432 PROTO=TCP SPT=59832 DPT=3943 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-17 17:37:36
221.122.78.206 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-17 17:44:20
218.78.46.81 attackspam
Nov 17 01:40:24 TORMINT sshd\[7981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81  user=nobody
Nov 17 01:40:26 TORMINT sshd\[7981\]: Failed password for nobody from 218.78.46.81 port 59319 ssh2
Nov 17 01:45:00 TORMINT sshd\[8321\]: Invalid user www from 218.78.46.81
Nov 17 01:45:00 TORMINT sshd\[8321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.78.46.81
...
2019-11-17 17:43:15
61.19.145.135 attackspam
Automatic report - Banned IP Access
2019-11-17 17:32:03
113.196.133.113 attack
Automatic report - Banned IP Access
2019-11-17 17:32:37
118.25.196.31 attack
Nov 16 22:31:08 web9 sshd\[6375\]: Invalid user jboss from 118.25.196.31
Nov 16 22:31:08 web9 sshd\[6375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.196.31
Nov 16 22:31:10 web9 sshd\[6375\]: Failed password for invalid user jboss from 118.25.196.31 port 44664 ssh2
Nov 16 22:35:05 web9 sshd\[6987\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.196.31  user=mysql
Nov 16 22:35:08 web9 sshd\[6987\]: Failed password for mysql from 118.25.196.31 port 46800 ssh2
2019-11-17 17:48:53

Recently Reported IPs

10.244.225.176 2606:4700:10::6814:5509 2606:4700:10::6814:8023 2606:4700:10::6816:1886
2606:4700:10::6816:4828 2606:4700:10::6814:6895 2606:4700:10::6814:5807 2606:4700:10::6816:363
2606:4700:10::6816:2277 2606:4700:10::6816:2405 2606:4700:10::6814:6498 2606:4700:10::6816:4056
2606:4700:10::6814:9874 110.77.226.217 110.78.150.143 2606:4700:10::6814:6779
2606:4700:10::6816:1478 2606:4700:10::ac43:627 2606:4700:10::ac43:2936 44.245.63.142