Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.117.1.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1388
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;143.117.1.58.			IN	A

;; AUTHORITY SECTION:
.			391	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:25:05 CST 2022
;; MSG SIZE  rcvd: 105
Host info
58.1.117.143.in-addr.arpa domain name pointer www.law.qub.ac.uk.
58.1.117.143.in-addr.arpa domain name pointer whatsonatqueens.com.
58.1.117.143.in-addr.arpa domain name pointer a1058.cc.qub.ac.uk.
58.1.117.143.in-addr.arpa domain name pointer heritagehub.ac.uk.
58.1.117.143.in-addr.arpa domain name pointer www.heritagehub.ac.uk.
58.1.117.143.in-addr.arpa domain name pointer ni-hpc.ac.uk.
58.1.117.143.in-addr.arpa domain name pointer smartcard.qub.ac.uk.
58.1.117.143.in-addr.arpa domain name pointer encore.qub.ac.uk.
58.1.117.143.in-addr.arpa domain name pointer afbilib.qub.ac.uk.
58.1.117.143.in-addr.arpa domain name pointer www.afbilib.qub.ac.uk.
58.1.117.143.in-addr.arpa domain name pointer www.cdt-piads.ac.uk.
58.1.117.143.in-addr.arpa domain name pointer cdt-piads.ac.uk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
58.1.117.143.in-addr.arpa	name = www.cdt-piads.ac.uk.
58.1.117.143.in-addr.arpa	name = cdt-piads.ac.uk.
58.1.117.143.in-addr.arpa	name = www.law.qub.ac.uk.
58.1.117.143.in-addr.arpa	name = whatsonatqueens.com.
58.1.117.143.in-addr.arpa	name = a1058.cc.qub.ac.uk.
58.1.117.143.in-addr.arpa	name = heritagehub.ac.uk.
58.1.117.143.in-addr.arpa	name = www.heritagehub.ac.uk.
58.1.117.143.in-addr.arpa	name = ni-hpc.ac.uk.
58.1.117.143.in-addr.arpa	name = smartcard.qub.ac.uk.
58.1.117.143.in-addr.arpa	name = encore.qub.ac.uk.
58.1.117.143.in-addr.arpa	name = afbilib.qub.ac.uk.
58.1.117.143.in-addr.arpa	name = www.afbilib.qub.ac.uk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
94.200.107.2 attack
Automatic report - Banned IP Access
2020-05-16 01:26:30
177.54.201.153 attackbots
Telnetd brute force attack detected by fail2ban
2020-05-16 01:58:51
176.107.232.67 attack
1589545367 - 05/15/2020 14:22:47 Host: 176.107.232.67/176.107.232.67 Port: 445 TCP Blocked
2020-05-16 01:35:24
157.39.60.1 attack
Lines containing failures of 157.39.60.1
May 15 14:03:50 majoron sshd[9932]: Invalid user ubnt from 157.39.60.1 port 51149
May 15 14:03:50 majoron sshd[9932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.39.60.1 
May 15 14:03:52 majoron sshd[9932]: Failed password for invalid user ubnt from 157.39.60.1 port 51149 ssh2
May 15 14:03:53 majoron sshd[9932]: Connection closed by invalid user ubnt 157.39.60.1 port 51149 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=157.39.60.1
2020-05-16 01:31:39
94.138.208.158 attackspam
May 15 17:33:46 dev0-dcde-rnet sshd[29794]: Failed password for root from 94.138.208.158 port 42084 ssh2
May 15 17:40:11 dev0-dcde-rnet sshd[29859]: Failed password for root from 94.138.208.158 port 50418 ssh2
May 15 17:44:11 dev0-dcde-rnet sshd[29875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.138.208.158
2020-05-16 01:40:17
94.76.97.127 attackspam
Invalid user ni from 94.76.97.127 port 40003
2020-05-16 01:29:37
202.179.70.39 attack
Port scan on 1 port(s): 8291
2020-05-16 02:02:00
134.209.44.17 attack
May 15 13:09:21 NPSTNNYC01T sshd[24119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.44.17
May 15 13:09:23 NPSTNNYC01T sshd[24119]: Failed password for invalid user cloud from 134.209.44.17 port 42098 ssh2
May 15 13:12:55 NPSTNNYC01T sshd[26209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.44.17
...
2020-05-16 01:26:48
106.13.87.145 attack
Brute-force attempt banned
2020-05-16 01:16:20
207.154.229.50 attackspam
May 15 17:09:37 ns381471 sshd[21732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.229.50
May 15 17:09:40 ns381471 sshd[21732]: Failed password for invalid user sftp_user from 207.154.229.50 port 51418 ssh2
2020-05-16 01:34:50
182.61.14.224 attackbots
May 15 18:21:00 lukav-desktop sshd\[8751\]: Invalid user tech from 182.61.14.224
May 15 18:21:00 lukav-desktop sshd\[8751\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.224
May 15 18:21:02 lukav-desktop sshd\[8751\]: Failed password for invalid user tech from 182.61.14.224 port 40196 ssh2
May 15 18:29:43 lukav-desktop sshd\[8845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.14.224  user=root
May 15 18:29:45 lukav-desktop sshd\[8845\]: Failed password for root from 182.61.14.224 port 38400 ssh2
2020-05-16 01:56:34
49.67.60.178 attack
May 15 14:10:24 myhostname sshd[12114]: Invalid user cvs from 49.67.60.178
May 15 14:10:24 myhostname sshd[12114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.67.60.178
May 15 14:10:27 myhostname sshd[12114]: Failed password for invalid user cvs from 49.67.60.178 port 7118 ssh2
May 15 14:10:27 myhostname sshd[12114]: Received disconnect from 49.67.60.178 port 7118:11: Normal Shutdown, Thank you for playing [preauth]
May 15 14:10:27 myhostname sshd[12114]: Disconnected from 49.67.60.178 port 7118 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.67.60.178
2020-05-16 01:54:49
196.189.91.138 attackbots
2020-05-15T12:19:27.960714abusebot-5.cloudsearch.cf sshd[24557]: Invalid user michael from 196.189.91.138 port 49630
2020-05-15T12:19:27.966314abusebot-5.cloudsearch.cf sshd[24557]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.189.91.138
2020-05-15T12:19:27.960714abusebot-5.cloudsearch.cf sshd[24557]: Invalid user michael from 196.189.91.138 port 49630
2020-05-15T12:19:29.809332abusebot-5.cloudsearch.cf sshd[24557]: Failed password for invalid user michael from 196.189.91.138 port 49630 ssh2
2020-05-15T12:23:06.089706abusebot-5.cloudsearch.cf sshd[24566]: Invalid user sims from 196.189.91.138 port 42242
2020-05-15T12:23:06.095838abusebot-5.cloudsearch.cf sshd[24566]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.189.91.138
2020-05-15T12:23:06.089706abusebot-5.cloudsearch.cf sshd[24566]: Invalid user sims from 196.189.91.138 port 42242
2020-05-15T12:23:08.003976abusebot-5.cloudsearch.cf sshd[245
...
2020-05-16 01:17:29
151.80.141.109 attackbotsspam
2020-05-15 04:32:51 server sshd[64156]: Failed password for invalid user student2 from 151.80.141.109 port 60568 ssh2
2020-05-16 01:32:58
111.252.8.169 attackspam
1589545343 - 05/15/2020 14:22:23 Host: 111.252.8.169/111.252.8.169 Port: 445 TCP Blocked
2020-05-16 01:54:23

Recently Reported IPs

143.125.223.58 143.131.190.1 143.131.213.80 143.131.243.156
143.121.245.41 143.132.8.208 143.137.111.167 143.137.130.108
143.137.129.226 143.137.130.57 143.137.129.24 143.137.52.2
143.137.63.243 143.137.43.23 143.137.94.59 143.163.12.134
143.164.101.67 143.164.101.227 143.166.147.101 143.165.158.62