Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: IS

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 156.8.140.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50899
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;156.8.140.142.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019070201 1800 900 604800 86400

;; Query time: 4 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 03 04:11:44 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 142.140.8.156.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 142.140.8.156.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.105.157.97 attackspam
Jul 13 21:05:39 localhost sshd\[29354\]: Invalid user laurent from 46.105.157.97 port 34138
Jul 13 21:05:39 localhost sshd\[29354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.105.157.97
Jul 13 21:05:41 localhost sshd\[29354\]: Failed password for invalid user laurent from 46.105.157.97 port 34138 ssh2
2019-07-14 06:00:49
174.3.4.118 attackspam
Jul 10 12:08:50 srv01 sshd[17830]: Invalid user portal from 174.3.4.118
Jul 10 12:08:50 srv01 sshd[17830]: Received disconnect from 174.3.4.118: 11: Bye Bye [preauth]
Jul 13 20:30:14 srv01 sshd[31842]: Failed password for jira from 174.3.4.118 port 40195 ssh2
Jul 13 20:30:14 srv01 sshd[31842]: Received disconnect from 174.3.4.118: 11: Bye Bye [preauth]
Jul 13 20:39:55 srv01 sshd[32367]: Failed password for jira from 174.3.4.118 port 39601 ssh2
Jul 13 20:39:55 srv01 sshd[32367]: Received disconnect from 174.3.4.118: 11: Bye Bye [preauth]
Jul 13 20:58:45 srv01 sshd[1124]: Failed password for jira from 174.3.4.118 port 51990 ssh2
Jul 13 20:58:46 srv01 sshd[1124]: Received disconnect from 174.3.4.118: 11: Bye Bye [preauth]
Jul 13 21:02:33 srv01 sshd[1522]: Failed password for jira from 174.3.4.118 port 33522 ssh2
Jul 13 21:02:33 srv01 sshd[1522]: Received disconnect from 174.3.4.118: 11: Bye Bye [preauth]
Jul 13 21:04:14 srv01 sshd[1586]: Failed password for jira from 174.3........
-------------------------------
2019-07-14 06:04:37
51.38.40.12 attackspambots
Jul 13 21:29:28 blackbee postfix/smtpd\[6665\]: warning: ns3117215.ip-51-38-40.eu\[51.38.40.12\]: SASL LOGIN authentication failed: authentication failure
Jul 13 21:29:30 blackbee postfix/smtpd\[6665\]: warning: ns3117215.ip-51-38-40.eu\[51.38.40.12\]: SASL LOGIN authentication failed: authentication failure
Jul 13 21:29:32 blackbee postfix/smtpd\[6665\]: warning: ns3117215.ip-51-38-40.eu\[51.38.40.12\]: SASL LOGIN authentication failed: authentication failure
Jul 13 21:29:34 blackbee postfix/smtpd\[6665\]: warning: ns3117215.ip-51-38-40.eu\[51.38.40.12\]: SASL LOGIN authentication failed: authentication failure
Jul 13 21:29:35 blackbee postfix/smtpd\[6665\]: warning: ns3117215.ip-51-38-40.eu\[51.38.40.12\]: SASL LOGIN authentication failed: authentication failure
...
2019-07-14 06:16:25
202.75.62.141 attackbots
$f2bV_matches
2019-07-14 06:06:43
202.51.110.214 attack
Jul 13 22:48:15 tux-35-217 sshd\[18307\]: Invalid user ventas from 202.51.110.214 port 55851
Jul 13 22:48:15 tux-35-217 sshd\[18307\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.110.214
Jul 13 22:48:18 tux-35-217 sshd\[18307\]: Failed password for invalid user ventas from 202.51.110.214 port 55851 ssh2
Jul 13 22:54:04 tux-35-217 sshd\[18320\]: Invalid user gk from 202.51.110.214 port 53224
Jul 13 22:54:04 tux-35-217 sshd\[18320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.51.110.214
...
2019-07-14 05:54:20
1.190.210.46 attackspam
Automatic report - Port Scan Attack
2019-07-14 06:02:47
85.163.230.163 attackspambots
Brute force attempt
2019-07-14 06:03:51
110.241.175.29 attackspam
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-13 17:06:54]
2019-07-14 05:39:03
103.228.142.13 attackbotsspam
Spam to target mail address hacked/leaked/bought from Kachingle
2019-07-14 06:22:13
218.92.0.199 attack
Jul 13 21:41:16 animalibera sshd[28603]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.199  user=root
Jul 13 21:41:18 animalibera sshd[28603]: Failed password for root from 218.92.0.199 port 64219 ssh2
...
2019-07-14 05:56:48
107.164.172.66 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-14 06:11:00
159.65.13.203 attack
Jul 13 22:39:29 srv-4 sshd\[6664\]: Invalid user theforest from 159.65.13.203
Jul 13 22:39:29 srv-4 sshd\[6664\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.13.203
Jul 13 22:39:31 srv-4 sshd\[6664\]: Failed password for invalid user theforest from 159.65.13.203 port 52576 ssh2
...
2019-07-14 05:56:04
221.201.208.84 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-14 06:13:18
54.39.13.83 attackbots
Honeypot attack, port: 23, PTR: ip83.ip-54-39-13.net.
2019-07-14 06:14:33
147.135.209.40 attackbots
2019-07-13T20:11:24.873913abusebot-8.cloudsearch.cf sshd\[3953\]: Invalid user opc from 147.135.209.40 port 47092
2019-07-14 05:50:25

Recently Reported IPs

41.182.42.138 103.11.163.248 217.107.121.169 59.115.178.199
78.181.101.155 213.207.249.19 107.20.49.246 37.255.167.1
27.37.254.187 190.109.189.194 118.70.182.185 177.68.214.191
77.32.154.85 106.52.230.77 46.101.117.196 185.64.242.139
195.154.211.66 134.209.237.152 0.37.134.171 178.96.118.53