Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.245.148.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2661
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.245.148.142.		IN	A

;; AUTHORITY SECTION:
.			544	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 100 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 19:28:54 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 142.148.245.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.148.245.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
138.204.234.14 attack
Unauthorized connection attempt from IP address 138.204.234.14 on Port 445(SMB)
2019-12-20 04:59:36
82.137.255.11 attackspam
Automatic report - Port Scan
2019-12-20 04:45:04
41.33.240.117 attack
Unauthorized connection attempt from IP address 41.33.240.117 on Port 445(SMB)
2019-12-20 04:59:24
188.149.201.227 attackspam
Dec 19 20:33:10 sd-53420 sshd\[21399\]: Invalid user temp123 from 188.149.201.227
Dec 19 20:33:10 sd-53420 sshd\[21399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.149.201.227
Dec 19 20:33:13 sd-53420 sshd\[21399\]: Failed password for invalid user temp123 from 188.149.201.227 port 47326 ssh2
Dec 19 20:38:57 sd-53420 sshd\[23520\]: Invalid user mahamud from 188.149.201.227
Dec 19 20:38:57 sd-53420 sshd\[23520\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.149.201.227
...
2019-12-20 04:44:48
93.171.141.141 attackbotsspam
Dec 19 18:48:07 ws25vmsma01 sshd[31481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.171.141.141
Dec 19 18:48:09 ws25vmsma01 sshd[31481]: Failed password for invalid user ashton from 93.171.141.141 port 59714 ssh2
...
2019-12-20 05:05:30
119.81.239.68 attackspambots
Dec 19 20:39:46 wh01 sshd[4279]: Failed password for root from 119.81.239.68 port 58390 ssh2
Dec 19 20:39:46 wh01 sshd[4279]: Received disconnect from 119.81.239.68 port 58390:11: Bye Bye [preauth]
Dec 19 20:39:46 wh01 sshd[4279]: Disconnected from 119.81.239.68 port 58390 [preauth]
Dec 19 20:46:47 wh01 sshd[4864]: Invalid user carlotta from 119.81.239.68 port 52426
Dec 19 20:46:47 wh01 sshd[4864]: Failed password for invalid user carlotta from 119.81.239.68 port 52426 ssh2
Dec 19 20:46:47 wh01 sshd[4864]: Received disconnect from 119.81.239.68 port 52426:11: Bye Bye [preauth]
Dec 19 20:46:47 wh01 sshd[4864]: Disconnected from 119.81.239.68 port 52426 [preauth]
Dec 19 21:08:42 wh01 sshd[6625]: Invalid user biglieri from 119.81.239.68 port 54166
Dec 19 21:08:42 wh01 sshd[6625]: Failed password for invalid user biglieri from 119.81.239.68 port 54166 ssh2
Dec 19 21:08:42 wh01 sshd[6625]: Received disconnect from 119.81.239.68 port 54166:11: Bye Bye [preauth]
Dec 19 21:08:42 wh01 sshd[6625
2019-12-20 05:16:14
79.137.82.213 attackspambots
Dec 19 15:25:48 TORMINT sshd\[23703\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213  user=root
Dec 19 15:25:50 TORMINT sshd\[23703\]: Failed password for root from 79.137.82.213 port 49460 ssh2
Dec 19 15:30:53 TORMINT sshd\[24043\]: Invalid user hilbert from 79.137.82.213
Dec 19 15:30:53 TORMINT sshd\[24043\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213
...
2019-12-20 04:43:04
191.248.195.210 attack
1576765924 - 12/19/2019 15:32:04 Host: 191.248.195.210/191.248.195.210 Port: 445 TCP Blocked
2019-12-20 05:12:45
221.160.100.14 attackspambots
Invalid user support from 221.160.100.14 port 47906
2019-12-20 05:12:24
195.158.8.206 attackbots
$f2bV_matches
2019-12-20 04:48:29
192.3.21.102 attack
2019-12-19T15:31:56.984260centos sshd\[1510\]: Invalid user crociatcrocker from 192.3.21.102 port 35840
2019-12-19T15:31:56.991468centos sshd\[1510\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.3.21.102
2019-12-19T15:31:59.246668centos sshd\[1510\]: Failed password for invalid user crociatcrocker from 192.3.21.102 port 35840 ssh2
2019-12-20 05:16:39
95.110.227.64 attack
Fail2Ban - SSH Bruteforce Attempt
2019-12-20 04:50:26
185.212.48.30 attackspambots
Unauthorized connection attempt from IP address 185.212.48.30 on Port 445(SMB)
2019-12-20 05:13:31
91.143.166.29 attackspambots
Unauthorized connection attempt from IP address 91.143.166.29 on Port 445(SMB)
2019-12-20 05:02:29
217.107.115.99 attackbots
" "
2019-12-20 05:14:02

Recently Reported IPs

34.127.75.228 177.249.60.238 192.241.204.36 128.199.203.151
189.217.201.8 142.93.168.235 103.74.172.251 201.193.111.170
115.242.204.122 185.213.190.100 77.42.237.126 18.237.251.93
42.192.86.190 211.78.81.254 5.244.67.51 171.221.14.163
206.189.154.226 109.94.216.68 134.236.141.70 113.118.217.134