Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.242.142.123
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19620
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.242.142.123.		IN	A

;; AUTHORITY SECTION:
.			335	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 03:52:54 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 123.142.242.146.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 123.142.242.146.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.12.119.148 attackspam
Unauthorized connection attempt detected from IP address 5.12.119.148 to port 23 [J]
2020-02-05 10:19:50
106.13.97.228 attack
Feb  5 00:07:49 cp sshd[18925]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.97.228
2020-02-05 10:08:56
168.0.81.99 attackbots
Unauthorized connection attempt detected from IP address 168.0.81.99 to port 23 [J]
2020-02-05 10:24:42
89.165.77.25 attack
Automatic report - Port Scan Attack
2020-02-05 10:11:35
37.157.202.227 attack
Unauthorized connection attempt detected from IP address 37.157.202.227 to port 8080 [J]
2020-02-05 10:18:22
139.162.244.237 attackbotsspam
Unauthorized connection attempt detected from IP address 139.162.244.237 to port 2404 [J]
2020-02-05 10:03:52
178.128.114.248 attack
Unauthorized connection attempt detected from IP address 178.128.114.248 to port 8545 [J]
2020-02-05 10:23:51
84.216.185.231 attack
Unauthorized connection attempt detected from IP address 84.216.185.231 to port 5555 [J]
2020-02-05 10:12:40
51.68.198.75 attack
Unauthorized connection attempt detected from IP address 51.68.198.75 to port 2220 [J]
2020-02-05 09:49:14
217.19.28.242 attack
Unauthorized connection attempt detected from IP address 217.19.28.242 to port 80 [J]
2020-02-05 10:20:53
174.138.36.91 attack
Feb  5 02:37:44 srv-ubuntu-dev3 sshd[92379]: Invalid user support2 from 174.138.36.91
Feb  5 02:37:44 srv-ubuntu-dev3 sshd[92379]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.36.91
Feb  5 02:37:44 srv-ubuntu-dev3 sshd[92379]: Invalid user support2 from 174.138.36.91
Feb  5 02:37:46 srv-ubuntu-dev3 sshd[92379]: Failed password for invalid user support2 from 174.138.36.91 port 44770 ssh2
Feb  5 02:40:53 srv-ubuntu-dev3 sshd[92835]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.36.91  user=www-data
Feb  5 02:40:56 srv-ubuntu-dev3 sshd[92835]: Failed password for www-data from 174.138.36.91 port 46242 ssh2
Feb  5 02:43:59 srv-ubuntu-dev3 sshd[93074]: Invalid user default from 174.138.36.91
Feb  5 02:43:59 srv-ubuntu-dev3 sshd[93074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.138.36.91
Feb  5 02:43:59 srv-ubuntu-dev3 sshd[93074]: Invalid use
...
2020-02-05 10:01:53
27.23.230.189 attackbots
Unauthorized connection attempt detected from IP address 27.23.230.189 to port 2323 [J]
2020-02-05 09:51:28
142.44.240.12 attackbots
Unauthorized connection attempt detected from IP address 142.44.240.12 to port 2220 [J]
2020-02-05 10:03:30
221.14.125.57 attackbots
Unauthorized connection attempt detected from IP address 221.14.125.57 to port 23 [J]
2020-02-05 09:53:49
201.103.193.100 attackspambots
Feb  5 01:32:42 * sshd[2940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.103.193.100
Feb  5 01:32:44 * sshd[2940]: Failed password for invalid user staffa from 201.103.193.100 port 58002 ssh2
2020-02-05 09:56:40

Recently Reported IPs

32.115.11.98 2.66.69.169 181.10.55.148 175.220.160.241
1.129.241.164 216.255.249.207 11.34.236.177 170.131.19.57
126.84.162.223 117.122.228.168 117.26.211.89 166.1.188.173
183.232.200.219 169.9.169.186 149.144.249.192 129.137.195.255
14.233.230.216 132.101.128.34 118.213.167.238 162.50.79.121