Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.21.243.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11359
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.21.243.143.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Sep 15 02:10:56 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 143.243.21.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 143.243.21.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.61.7.72 attack
May 20 10:28:12 pve1 sshd[848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.61.7.72 
May 20 10:28:13 pve1 sshd[848]: Failed password for invalid user ijf from 217.61.7.72 port 58970 ssh2
...
2020-05-20 23:18:08
198.98.62.220 attackspambots
Automatic report - Port Scan
2020-05-20 23:51:46
113.193.243.35 attackbots
ssh intrusion attempt
2020-05-20 23:42:15
137.97.95.186 attack
Unauthorized connection attempt from IP address 137.97.95.186 on Port 445(SMB)
2020-05-20 23:34:27
50.100.113.207 attackspam
$f2bV_matches
2020-05-20 23:14:16
183.88.0.34 attack
Unauthorized connection attempt from IP address 183.88.0.34 on Port 445(SMB)
2020-05-20 23:30:33
14.247.228.66 attackbotsspam
May 20 09:25:26 mxgate1 postfix/postscreen[9735]: CONNECT from [14.247.228.66]:43971 to [176.31.12.44]:25
May 20 09:25:26 mxgate1 postfix/dnsblog[9878]: addr 14.247.228.66 listed by domain b.barracudacentral.org as 127.0.0.2
May 20 09:25:28 mxgate1 postfix/dnsblog[10397]: addr 14.247.228.66 listed by domain zen.spamhaus.org as 127.0.0.4
May 20 09:25:28 mxgate1 postfix/dnsblog[10397]: addr 14.247.228.66 listed by domain zen.spamhaus.org as 127.0.0.11
May 20 09:25:28 mxgate1 postfix/dnsblog[9879]: addr 14.247.228.66 listed by domain cbl.abuseat.org as 127.0.0.2
May 20 09:25:32 mxgate1 postfix/postscreen[9735]: DNSBL rank 4 for [14.247.228.66]:43971
May x@x
May 20 09:25:33 mxgate1 postfix/postscreen[9735]: HANGUP after 1 from [14.247.228.66]:43971 in tests after SMTP handshake
May 20 09:25:33 mxgate1 postfix/postscreen[9735]: DISCONNECT [14.247.228.66]:43971


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.247.228.66
2020-05-20 23:46:17
144.217.178.248 attackspam
MAIL: User Login Brute Force Attempt
2020-05-20 23:30:55
171.6.232.211 attackspambots
1589960709 - 05/20/2020 09:45:09 Host: 171.6.232.211/171.6.232.211 Port: 445 TCP Blocked
2020-05-20 23:55:23
92.47.155.195 attackbotsspam
Unauthorized connection attempt from IP address 92.47.155.195 on Port 445(SMB)
2020-05-20 23:13:47
209.141.58.58 attack
2020-05-20T09:26:59.006228randservbullet-proofcloud-66.localdomain sshd[13700]: Invalid user nologin from 209.141.58.58 port 58400
2020-05-20T09:26:59.010265randservbullet-proofcloud-66.localdomain sshd[13700]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=209.141.58.58
2020-05-20T09:26:59.006228randservbullet-proofcloud-66.localdomain sshd[13700]: Invalid user nologin from 209.141.58.58 port 58400
2020-05-20T09:27:00.997069randservbullet-proofcloud-66.localdomain sshd[13700]: Failed password for invalid user nologin from 209.141.58.58 port 58400 ssh2
...
2020-05-20 23:33:16
197.46.49.98 attackbots
Attempted connection to port 445.
2020-05-20 23:12:00
210.14.131.168 attackbotsspam
May 20 11:00:51 santamaria sshd\[14679\]: Invalid user zmu from 210.14.131.168
May 20 11:00:51 santamaria sshd\[14679\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.14.131.168
May 20 11:00:53 santamaria sshd\[14679\]: Failed password for invalid user zmu from 210.14.131.168 port 22954 ssh2
...
2020-05-20 23:33:01
37.34.179.221 attackbotsspam
Automatic report - Port Scan Attack
2020-05-20 23:45:55
183.2.168.102 attackbots
$f2bV_matches
2020-05-20 23:23:22

Recently Reported IPs

9.49.173.252 105.250.218.24 147.47.203.58 110.51.96.235
163.82.56.144 169.127.95.94 245.248.170.131 69.104.35.196
110.89.108.41 92.22.186.114 177.111.180.243 123.234.0.225
204.9.215.99 150.104.194.192 153.143.193.163 105.2.192.9
153.239.1.215 174.54.146.202 179.54.137.122 75.205.110.7