Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 147.104.43.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42255
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;147.104.43.142.			IN	A

;; AUTHORITY SECTION:
.			426	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010602 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 08:47:49 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 142.43.104.147.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.43.104.147.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.136.64 attackspambots
Automatic report - Banned IP Access
2019-11-11 04:56:58
5.236.129.72 attackbots
port scan and connect, tcp 80 (http)
2019-11-11 05:00:28
36.250.234.33 attack
2019-11-10T18:35:58.184533abusebot-5.cloudsearch.cf sshd\[27623\]: Invalid user vnc from 36.250.234.33 port 53426
2019-11-11 04:59:31
106.12.185.58 attack
Nov 10 21:04:43 gw1 sshd[21421]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.185.58
Nov 10 21:04:45 gw1 sshd[21421]: Failed password for invalid user test from 106.12.185.58 port 36378 ssh2
...
2019-11-11 05:16:00
149.202.198.86 attackspambots
Nov 10 15:53:12 ny01 sshd[28686]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.198.86
Nov 10 15:53:14 ny01 sshd[28686]: Failed password for invalid user minecraft from 149.202.198.86 port 55998 ssh2
Nov 10 15:56:01 ny01 sshd[29292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.198.86
2019-11-11 05:17:14
114.40.77.56 attackspambots
port scan and connect, tcp 23 (telnet)
2019-11-11 05:10:37
118.25.231.17 attackspam
Automatic report - Banned IP Access
2019-11-11 05:19:16
123.207.153.52 attackbots
Nov 10 18:00:31 mail sshd[19043]: Invalid user testest from 123.207.153.52
Nov 10 18:00:31 mail sshd[19043]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.153.52
Nov 10 18:00:31 mail sshd[19043]: Invalid user testest from 123.207.153.52
Nov 10 18:00:33 mail sshd[19043]: Failed password for invalid user testest from 123.207.153.52 port 51862 ssh2
Nov 10 18:07:20 mail sshd[19814]: Invalid user server from 123.207.153.52
...
2019-11-11 04:48:31
46.174.115.14 attackbotsspam
[portscan] Port scan
2019-11-11 05:02:48
222.186.175.212 attackspambots
Nov 10 21:52:26 MK-Soft-Root1 sshd[5078]: Failed password for root from 222.186.175.212 port 29196 ssh2
Nov 10 21:52:31 MK-Soft-Root1 sshd[5078]: Failed password for root from 222.186.175.212 port 29196 ssh2
...
2019-11-11 04:52:40
106.12.188.252 attackbots
Nov 10 19:49:11 marvibiene sshd[11882]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.188.252  user=root
Nov 10 19:49:14 marvibiene sshd[11882]: Failed password for root from 106.12.188.252 port 59710 ssh2
Nov 10 20:08:04 marvibiene sshd[11999]: Invalid user qj from 106.12.188.252 port 54670
...
2019-11-11 05:01:03
106.12.15.235 attack
2019-11-10T17:05:13.913918stark.klein-stark.info sshd\[21103\]: Invalid user denise from 106.12.15.235 port 37384
2019-11-10T17:05:13.920810stark.klein-stark.info sshd\[21103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.15.235
2019-11-10T17:05:15.484401stark.klein-stark.info sshd\[21103\]: Failed password for invalid user denise from 106.12.15.235 port 37384 ssh2
...
2019-11-11 04:57:18
194.181.140.218 attack
Nov  8 04:40:42 debian sshd\[623\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.181.140.218  user=root
Nov  8 04:40:44 debian sshd\[623\]: Failed password for root from 194.181.140.218 port 43180 ssh2
Nov  8 04:55:27 debian sshd\[1606\]: Invalid user chu from 194.181.140.218 port 57290
Nov  8 04:55:27 debian sshd\[1606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.181.140.218
Nov  8 04:55:29 debian sshd\[1606\]: Failed password for invalid user chu from 194.181.140.218 port 57290 ssh2
Nov  8 04:58:47 debian sshd\[1791\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.181.140.218  user=root
Nov  8 04:58:49 debian sshd\[1791\]: Failed password for root from 194.181.140.218 port 46921 ssh2
Nov  8 05:02:10 debian sshd\[2097\]: Invalid user admin from 194.181.140.218 port 36548
Nov  8 05:02:10 debian sshd\[2097\]: pam_unix\(sshd:auth\): authe
...
2019-11-11 05:09:03
190.64.141.18 attackbotsspam
Nov 10 20:32:13 eventyay sshd[19881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.141.18
Nov 10 20:32:15 eventyay sshd[19881]: Failed password for invalid user dear from 190.64.141.18 port 38741 ssh2
Nov 10 20:36:58 eventyay sshd[19954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.64.141.18
...
2019-11-11 04:51:36
119.29.62.104 attackspambots
Nov 10 20:16:48 MK-Soft-VM6 sshd[8260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.62.104 
Nov 10 20:16:50 MK-Soft-VM6 sshd[8260]: Failed password for invalid user jedrzej from 119.29.62.104 port 56628 ssh2
...
2019-11-11 04:51:54

Recently Reported IPs

210.186.225.168 200.125.64.41 197.199.252.145 194.50.254.169
191.54.79.77 189.141.9.172 189.0.40.204 186.225.180.234
182.211.179.96 178.161.151.242 178.22.249.233 173.178.60.221
171.126.47.159 170.84.76.39 154.79.248.223 151.235.252.81
150.109.182.127 70.30.219.219 1.36.72.30 121.159.192.223