Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Yuseong-gu

Region: Daejeon Metropolitan City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 143.248.142.18
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39350
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;143.248.142.18.			IN	A

;; AUTHORITY SECTION:
.			267	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023062800 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jun 28 19:21:28 CST 2023
;; MSG SIZE  rcvd: 107
Host info
Host 18.142.248.143.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 18.142.248.143.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.7.47 attackbotsspam
Oct  2 11:26:37 hanapaa sshd\[28107\]: Invalid user hei from 49.235.7.47
Oct  2 11:26:37 hanapaa sshd\[28107\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.7.47
Oct  2 11:26:39 hanapaa sshd\[28107\]: Failed password for invalid user hei from 49.235.7.47 port 33134 ssh2
Oct  2 11:29:37 hanapaa sshd\[28380\]: Invalid user sentry from 49.235.7.47
Oct  2 11:29:37 hanapaa sshd\[28380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.7.47
2019-10-03 05:52:32
183.80.112.55 attackbotsspam
(Oct  3)  LEN=40 TTL=46 ID=10204 TCP DPT=8080 WINDOW=23361 SYN 
 (Oct  2)  LEN=40 TTL=46 ID=48529 TCP DPT=8080 WINDOW=23361 SYN 
 (Oct  2)  LEN=40 TTL=46 ID=43531 TCP DPT=8080 WINDOW=4604 SYN 
 (Oct  2)  LEN=40 TTL=46 ID=28080 TCP DPT=8080 WINDOW=23361 SYN 
 (Oct  2)  LEN=40 TTL=46 ID=37974 TCP DPT=8080 WINDOW=4604 SYN 
 (Oct  1)  LEN=40 TTL=46 ID=21968 TCP DPT=8080 WINDOW=4604 SYN 
 (Oct  1)  LEN=40 TTL=46 ID=5565 TCP DPT=8080 WINDOW=23361 SYN 
 (Sep 30)  LEN=40 TTL=42 ID=2467 TCP DPT=8080 WINDOW=23361 SYN 
 (Sep 30)  LEN=40 TTL=42 ID=61151 TCP DPT=8080 WINDOW=4604 SYN 
 (Sep 30)  LEN=40 TTL=46 ID=32510 TCP DPT=8080 WINDOW=23361 SYN
2019-10-03 05:46:51
138.68.93.14 attack
Oct  2 23:25:27 tux-35-217 sshd\[20399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14  user=root
Oct  2 23:25:28 tux-35-217 sshd\[20399\]: Failed password for root from 138.68.93.14 port 35712 ssh2
Oct  2 23:29:32 tux-35-217 sshd\[20435\]: Invalid user basil from 138.68.93.14 port 48130
Oct  2 23:29:32 tux-35-217 sshd\[20435\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.93.14
...
2019-10-03 05:56:27
107.170.20.247 attack
Oct  2 11:12:40 php1 sshd\[955\]: Invalid user kun from 107.170.20.247
Oct  2 11:12:40 php1 sshd\[955\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.20.247
Oct  2 11:12:42 php1 sshd\[955\]: Failed password for invalid user kun from 107.170.20.247 port 33775 ssh2
Oct  2 11:16:53 php1 sshd\[1492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.170.20.247  user=root
Oct  2 11:16:55 php1 sshd\[1492\]: Failed password for root from 107.170.20.247 port 53982 ssh2
2019-10-03 05:23:07
200.46.248.130 attackspambots
Oct  2 03:35:14 php1 sshd\[27901\]: Invalid user lori from 200.46.248.130
Oct  2 03:35:14 php1 sshd\[27901\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.46.248.130
Oct  2 03:35:16 php1 sshd\[27901\]: Failed password for invalid user lori from 200.46.248.130 port 42522 ssh2
Oct  2 03:39:45 php1 sshd\[28769\]: Invalid user rodriguez from 200.46.248.130
Oct  2 03:39:45 php1 sshd\[28769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.46.248.130
2019-10-03 05:18:54
220.166.78.25 attack
*Port Scan* detected from 220.166.78.25 (CN/China/25.78.166.220.broad.dy.sc.dynamic.163data.com.cn). 4 hits in the last 95 seconds
2019-10-03 05:26:34
193.32.160.135 attackspambots
postfix-gen jail [ma]
2019-10-03 05:49:50
115.238.236.74 attack
Oct  2 17:40:41 TORMINT sshd\[25496\]: Invalid user goutte from 115.238.236.74
Oct  2 17:40:41 TORMINT sshd\[25496\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.238.236.74
Oct  2 17:40:43 TORMINT sshd\[25496\]: Failed password for invalid user goutte from 115.238.236.74 port 54110 ssh2
...
2019-10-03 05:43:03
1.34.1.142 attackspambots
Unauthorized connection attempt from IP address 1.34.1.142 on Port 445(SMB)
2019-10-03 05:33:14
176.33.225.83 attackspam
176.33.225.83 - - \[02/Oct/2019:14:29:58 -0700\] "POST /index.php/admin/ HTTP/1.1" 404 20599176.33.225.83 - - \[02/Oct/2019:14:29:58 -0700\] "POST /index.php/admin HTTP/1.1" 404 20595176.33.225.83 - User \[02/Oct/2019:14:29:58 -0700\] "GET /rss/catalog/notifystock/ HTTP/1.1" 401 25
...
2019-10-03 05:34:40
86.175.78.190 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/86.175.78.190/ 
 GB - 1H : (126)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : GB 
 NAME ASN : ASN2856 
 
 IP : 86.175.78.190 
 
 CIDR : 86.160.0.0/12 
 
 PREFIX COUNT : 292 
 
 UNIQUE IP COUNT : 10658560 
 
 
 WYKRYTE ATAKI Z ASN2856 :  
  1H - 8 
  3H - 10 
  6H - 10 
 12H - 11 
 24H - 14 
 
 DateTime : 2019-10-02 23:29:52 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-03 05:40:29
115.249.92.88 attackbots
2019-10-02T17:02:51.6233881495-001 sshd\[21815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.249.92.88
2019-10-02T17:02:54.0544621495-001 sshd\[21815\]: Failed password for invalid user waredox from 115.249.92.88 port 40078 ssh2
2019-10-02T17:13:29.4334231495-001 sshd\[22670\]: Invalid user Admin from 115.249.92.88 port 37096
2019-10-02T17:13:29.4409791495-001 sshd\[22670\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.249.92.88
2019-10-02T17:13:31.4602091495-001 sshd\[22670\]: Failed password for invalid user Admin from 115.249.92.88 port 37096 ssh2
2019-10-02T17:18:47.7332871495-001 sshd\[22970\]: Invalid user diamond from 115.249.92.88 port 49724
...
2019-10-03 05:37:11
109.102.158.14 attackspam
Oct  2 23:29:26 localhost sshd\[13803\]: Invalid user iy from 109.102.158.14 port 49068
Oct  2 23:29:27 localhost sshd\[13803\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.102.158.14
Oct  2 23:29:28 localhost sshd\[13803\]: Failed password for invalid user iy from 109.102.158.14 port 49068 ssh2
2019-10-03 05:45:43
37.79.254.216 attack
Oct  2 23:25:48 SilenceServices sshd[17882]: Failed password for root from 37.79.254.216 port 36658 ssh2
Oct  2 23:29:34 SilenceServices sshd[20694]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.79.254.216
Oct  2 23:29:36 SilenceServices sshd[20694]: Failed password for invalid user ex from 37.79.254.216 port 47770 ssh2
2019-10-03 05:54:19
222.186.180.17 attackbotsspam
Oct  2 21:38:33 hcbbdb sshd\[29175\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.17  user=root
Oct  2 21:38:35 hcbbdb sshd\[29175\]: Failed password for root from 222.186.180.17 port 52676 ssh2
Oct  2 21:38:38 hcbbdb sshd\[29175\]: Failed password for root from 222.186.180.17 port 52676 ssh2
Oct  2 21:38:42 hcbbdb sshd\[29175\]: Failed password for root from 222.186.180.17 port 52676 ssh2
Oct  2 21:38:46 hcbbdb sshd\[29175\]: Failed password for root from 222.186.180.17 port 52676 ssh2
2019-10-03 05:41:05

Recently Reported IPs

128.232.80.255 140.116.82.249 143.225.97.184 140.117.184.32
158.129.18.75 147.46.121.17 140.116.33.224 129.133.52.11
140.116.253.192 128.4.24.98 101.6.62.136 140.116.72.209
144.30.124.210 120.114.151.4 140.116.18.200 61.56.15.13
129.132.114.203 129.132.53.40 140.116.157.98 140.116.161.239