Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 142.97.148.169
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2925
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;142.97.148.169.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:11:02 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 169.148.97.142.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 142.97.148.169.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
127.0.0.1 spambotsattackproxy
Google.com
2019-08-23 10:33:36
46.145.165.169 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-22 19:42:32,373 INFO [amun_request_handler] unknown vuln (Attacker: 46.145.165.169 Port: 25, Mess: ['ehlo rds01
'] (12) Stages: ['IMAIL_STAGE1'])
2019-08-23 10:41:45
89.108.186.202 attackbotsspam
2019-08-22 19:27:26 H=([89.108.186.202]) [89.108.186.202]:11795 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=89.108.186.202)
2019-08-22 19:27:28 unexpected disconnection while reading SMTP command from ([89.108.186.202]) [89.108.186.202]:11795 I=[10.100.18.20]:25 (error: Connection reset by peer)
2019-08-22 20:58:00 H=([89.108.186.202]) [89.108.186.202]:56095 I=[10.100.18.20]:25 F=: Host/domain is listed in RBL cbl.abuseat.org (Blocked - see hxxp://www.abuseat.org/lookup.cgi?ip=89.108.186.202)


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=89.108.186.202
2019-08-23 10:24:38
222.186.52.124 attack
Aug 23 04:31:33 legacy sshd[19278]: Failed password for root from 222.186.52.124 port 58972 ssh2
Aug 23 04:31:42 legacy sshd[19281]: Failed password for root from 222.186.52.124 port 49220 ssh2
...
2019-08-23 10:44:19
41.73.252.236 attackbotsspam
DATE:2019-08-23 04:08:07,IP:41.73.252.236,MATCHES:11,PORT:ssh
2019-08-23 11:01:31
139.59.79.56 attack
Aug 22 16:36:52 auw2 sshd\[25277\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.79.56  user=root
Aug 22 16:36:54 auw2 sshd\[25277\]: Failed password for root from 139.59.79.56 port 44992 ssh2
Aug 22 16:42:25 auw2 sshd\[25861\]: Invalid user fake from 139.59.79.56
Aug 22 16:42:25 auw2 sshd\[25861\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.79.56
Aug 22 16:42:28 auw2 sshd\[25861\]: Failed password for invalid user fake from 139.59.79.56 port 60298 ssh2
2019-08-23 10:46:21
189.125.2.234 attack
SSHScan
2019-08-23 10:11:38
157.230.222.2 attackbots
SSH Brute-Force attacks
2019-08-23 10:58:33
122.176.44.163 attackbotsspam
Aug 23 04:02:19 legacy sshd[18487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.44.163
Aug 23 04:02:22 legacy sshd[18487]: Failed password for invalid user rockdrillftp from 122.176.44.163 port 46772 ssh2
Aug 23 04:07:13 legacy sshd[18608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.176.44.163
...
2019-08-23 10:15:29
114.108.181.165 attackspambots
Aug 23 00:13:09 bouncer sshd\[13836\]: Invalid user ttest from 114.108.181.165 port 57518
Aug 23 00:13:09 bouncer sshd\[13836\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.108.181.165 
Aug 23 00:13:11 bouncer sshd\[13836\]: Failed password for invalid user ttest from 114.108.181.165 port 57518 ssh2
...
2019-08-23 10:31:53
62.99.178.231 attackspambots
SSH Brute-Force attacks
2019-08-23 10:09:04
70.89.88.3 attackspambots
2019-08-22T20:01:35.566883abusebot-5.cloudsearch.cf sshd\[2476\]: Invalid user postgres from 70.89.88.3 port 58448
2019-08-23 10:35:42
218.92.0.200 attackbots
2019-08-23T02:15:21.913937abusebot-6.cloudsearch.cf sshd\[28807\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.200  user=root
2019-08-23 10:46:37
81.182.254.124 attackbotsspam
Aug 22 14:48:17 eddieflores sshd\[29076\]: Invalid user release from 81.182.254.124
Aug 22 14:48:17 eddieflores sshd\[29076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl51b6fe7c.fixip.t-online.hu
Aug 22 14:48:19 eddieflores sshd\[29076\]: Failed password for invalid user release from 81.182.254.124 port 51122 ssh2
Aug 22 14:52:45 eddieflores sshd\[29495\]: Invalid user nedkwebb from 81.182.254.124
Aug 22 14:52:45 eddieflores sshd\[29495\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=dsl51b6fe7c.fixip.t-online.hu
2019-08-23 10:25:03
171.6.174.142 attackbots
SSHScan
2019-08-23 10:44:51

Recently Reported IPs

48.98.51.2 72.34.10.250 146.250.135.73 2.134.174.138
194.174.189.242 91.85.213.47 56.106.234.117 246.126.150.212
65.179.94.136 66.76.195.243 193.201.68.61 88.210.81.142
178.23.130.154 28.209.96.203 228.238.55.131 182.136.57.127
140.205.116.210 5.89.28.229 19.75.205.35 228.203.98.194