Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 144.168.242.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29144
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;144.168.242.142.		IN	A

;; AUTHORITY SECTION:
.			160	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022101100 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Oct 11 22:48:50 CST 2022
;; MSG SIZE  rcvd: 108
Host info
142.242.168.144.in-addr.arpa domain name pointer smtp142.growbiz.io.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.242.168.144.in-addr.arpa	name = smtp142.growbiz.io.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
221.231.126.170 attackbotsspam
Jan 13 01:37:20 vps58358 sshd\[29817\]: Invalid user svnuser from 221.231.126.170Jan 13 01:37:22 vps58358 sshd\[29817\]: Failed password for invalid user svnuser from 221.231.126.170 port 33308 ssh2Jan 13 01:41:21 vps58358 sshd\[29889\]: Invalid user karol from 221.231.126.170Jan 13 01:41:23 vps58358 sshd\[29889\]: Failed password for invalid user karol from 221.231.126.170 port 35870 ssh2Jan 13 01:45:26 vps58358 sshd\[29942\]: Invalid user sshvpn from 221.231.126.170Jan 13 01:45:28 vps58358 sshd\[29942\]: Failed password for invalid user sshvpn from 221.231.126.170 port 38430 ssh2
...
2020-01-13 09:06:22
79.31.119.155 attackspambots
Jan 12 22:04:18 riskplan-s sshd[10707]: Did not receive identification string from 79.31.119.155
Jan 12 22:09:58 riskplan-s sshd[10795]: Received disconnect from 79.31.119.155: 11: Bye Bye [preauth]
Jan 12 22:11:43 riskplan-s sshd[10814]: Invalid user admin from 79.31.119.155
Jan 12 22:11:45 riskplan-s sshd[10814]: Failed password for invalid user admin from 79.31.119.155 port 53885 ssh2
Jan 12 22:11:45 riskplan-s sshd[10814]: Received disconnect from 79.31.119.155: 11: Bye Bye [preauth]
Jan 12 22:13:54 riskplan-s sshd[10846]: Invalid user ubuntu from 79.31.119.155
Jan 12 22:13:55 riskplan-s sshd[10846]: Failed password for invalid user ubuntu from 79.31.119.155 port 54069 ssh2
Jan 12 22:13:55 riskplan-s sshd[10846]: Received disconnect from 79.31.119.155: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=79.31.119.155
2020-01-13 09:21:18
92.118.37.99 attackbotsspam
Jan 13 05:55:48 debian-2gb-nbg1-2 kernel: \[1150652.319887\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.37.99 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=2080 PROTO=TCP SPT=52751 DPT=31801 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-13 13:05:17
54.162.46.90 attackbotsspam
Unauthorized connection attempt detected from IP address 54.162.46.90 to port 2220 [J]
2020-01-13 09:11:49
200.94.140.94 attackbotsspam
Unauthorized connection attempt from IP address 200.94.140.94 on Port 445(SMB)
2020-01-13 09:26:54
43.228.125.7 attackspambots
Unauthorized connection attempt detected from IP address 43.228.125.7 to port 2220 [J]
2020-01-13 09:04:16
110.52.215.80 attack
2020-01-12T23:24:22.8623951495-001 sshd[42123]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.52.215.80  user=root
2020-01-12T23:24:24.9956711495-001 sshd[42123]: Failed password for root from 110.52.215.80 port 49948 ssh2
2020-01-12T23:44:07.9218801495-001 sshd[42940]: Invalid user zs from 110.52.215.80 port 50464
2020-01-12T23:44:07.9292291495-001 sshd[42940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.52.215.80
2020-01-12T23:44:07.9218801495-001 sshd[42940]: Invalid user zs from 110.52.215.80 port 50464
2020-01-12T23:44:10.4108551495-001 sshd[42940]: Failed password for invalid user zs from 110.52.215.80 port 50464 ssh2
2020-01-12T23:46:21.9964761495-001 sshd[43046]: Invalid user fernanda from 110.52.215.80 port 39680
2020-01-12T23:46:22.0038931495-001 sshd[43046]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.52.215.80
2020-01-12T23:46:21.9964
...
2020-01-13 13:04:24
221.140.151.235 attackspam
2020-01-12 21:54:14,729 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 221.140.151.235
2020-01-12 22:29:01,334 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 221.140.151.235
2020-01-12 23:04:45,273 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 221.140.151.235
2020-01-12 23:40:43,027 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 221.140.151.235
2020-01-13 00:14:03,367 fail2ban.actions        [2870]: NOTICE  [sshd] Ban 221.140.151.235
...
2020-01-13 09:29:22
125.213.150.7 attackspam
Jan 13 05:52:09 vpn01 sshd[7301]: Failed password for root from 125.213.150.7 port 59166 ssh2
...
2020-01-13 13:03:05
45.14.148.98 attackspambots
RO_Parfumuri Femei.com SRL_<177>1578891410 [1:2522084:3938] ET TOR Known Tor Relay/Router (Not Exit) Node TCP Traffic group 85 [Classification: Misc Attack] [Priority: 2] {TCP} 45.14.148.98:47926
2020-01-13 13:01:30
41.140.111.107 attackbots
Lines containing failures of 41.140.111.107
Jan 12 22:16:13 majoron sshd[23924]: Invalid user support from 41.140.111.107 port 62866
Jan 12 22:16:14 majoron sshd[23924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.140.111.107 
Jan 12 22:16:16 majoron sshd[23924]: Failed password for invalid user support from 41.140.111.107 port 62866 ssh2
Jan 12 22:16:16 majoron sshd[23924]: Connection closed by invalid user support 41.140.111.107 port 62866 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=41.140.111.107
2020-01-13 09:29:38
36.78.3.92 attackbots
$f2bV_matches
2020-01-13 13:06:08
170.83.146.82 attackbots
Automatic report - Port Scan Attack
2020-01-13 09:31:11
111.20.56.246 attack
Unauthorized connection attempt detected from IP address 111.20.56.246 to port 2220 [J]
2020-01-13 09:32:17
62.160.38.123 attack
Jan 13 01:49:00 meumeu sshd[26681]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.160.38.123 
Jan 13 01:49:01 meumeu sshd[26681]: Failed password for invalid user empresa from 62.160.38.123 port 52332 ssh2
Jan 13 01:53:45 meumeu sshd[27428]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.160.38.123 
...
2020-01-13 09:15:24

Recently Reported IPs

45.57.234.23 23.229.112.198 23.229.97.44 45.57.234.7
152.1.109.64 90.202.114.103 140.250.152.174 128.90.162.21
23.94.227.132 128.90.158.37 128.90.160.56 144.22.135.122
149.129.136.165 128.90.155.187 128.90.157.85 128.90.167.47
128.90.159.171 139.227.254.135 128.90.158.100 152.246.213.241