Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.42.12.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23946
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.42.12.65.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 09:02:55 CST 2025
;; MSG SIZE  rcvd: 105
Host info
65.12.42.146.in-addr.arpa domain name pointer non-routed-un-exposed-IP.42.146.in-addr.arpa.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
65.12.42.146.in-addr.arpa	name = non-routed-un-exposed-IP.42.146.in-addr.arpa.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.234.249.196 attack
Invalid user noo from 186.234.249.196 port 44499
2020-07-18 23:43:05
61.95.233.61 attack
Jul 18 17:18:24 minden010 sshd[19325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61
Jul 18 17:18:26 minden010 sshd[19325]: Failed password for invalid user megan from 61.95.233.61 port 49654 ssh2
Jul 18 17:23:09 minden010 sshd[20865]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61
...
2020-07-18 23:27:28
64.225.58.236 attack
Brute-force attempt banned
2020-07-18 23:26:36
77.210.180.8 attackbots
Invalid user colin from 77.210.180.8 port 40584
2020-07-18 23:24:39
85.175.171.169 attackspam
Invalid user eth from 85.175.171.169 port 46174
2020-07-19 00:02:29
190.32.21.250 attackbotsspam
Brute-force attempt banned
2020-07-18 23:40:56
78.195.178.119 attackspam
Invalid user pi from 78.195.178.119 port 46915
2020-07-19 00:03:30
154.120.242.70 attack
Jul 18 16:16:43 l03 sshd[21949]: Invalid user app-admin from 154.120.242.70 port 57602
...
2020-07-18 23:50:00
45.80.65.82 attackbots
Invalid user kanishk from 45.80.65.82 port 38362
2020-07-18 23:33:27
185.165.168.229 attack
Invalid user admin from 185.165.168.229 port 50626
2020-07-18 23:45:03
122.51.27.69 attackspambots
Invalid user darren from 122.51.27.69 port 57134
2020-07-18 23:54:43
185.220.101.229 attack
Invalid user admin from 185.220.101.229 port 4314
2020-07-18 23:43:59
51.195.136.190 attackspam
Jul 18 11:23:26 mx sshd[2868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.195.136.190
Jul 18 11:23:27 mx sshd[2868]: Failed password for invalid user admin from 51.195.136.190 port 42396 ssh2
2020-07-18 23:29:42
142.44.139.12 attackbots
20 attempts against mh-misbehave-ban on lake
2020-07-18 23:52:00
107.189.10.93 attackspambots
(mod_security) mod_security (id:218420) triggered by 107.189.10.93 (US/United States/exit.tor.gg): 5 in the last 3600 secs
2020-07-18 23:57:00

Recently Reported IPs

167.4.125.199 187.96.228.212 109.125.139.140 184.188.73.197
192.105.145.107 237.209.185.158 92.156.94.112 220.156.158.151
219.75.220.188 224.164.217.106 77.45.149.36 108.163.18.203
168.14.115.103 92.42.37.64 217.86.19.102 251.21.51.71
32.164.117.55 237.25.99.51 62.131.1.113 28.71.208.217