Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: France

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.94.12.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4858
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;163.94.12.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022500 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 14:03:58 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 142.12.94.163.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.12.94.163.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
165.227.182.136 attackspambots
Brute-force attempt banned
2020-07-19 01:06:22
78.128.113.230 attackspam
Jul 18 18:20:46 vpn01 sshd[4436]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.128.113.230
Jul 18 18:20:48 vpn01 sshd[4436]: Failed password for invalid user admin from 78.128.113.230 port 53170 ssh2
...
2020-07-19 00:42:54
192.81.209.72 attack
Invalid user seb from 192.81.209.72 port 58570
2020-07-19 00:59:02
59.63.215.209 attack
Invalid user tibero from 59.63.215.209 port 46818
2020-07-19 00:45:45
124.205.224.179 attack
Jul 18 14:29:41 web-main sshd[648883]: Invalid user lat from 124.205.224.179 port 48460
Jul 18 14:29:42 web-main sshd[648883]: Failed password for invalid user lat from 124.205.224.179 port 48460 ssh2
Jul 18 14:37:09 web-main sshd[648906]: Invalid user article from 124.205.224.179 port 36212
2020-07-19 00:33:27
185.220.102.249 attack
prod8
...
2020-07-19 01:01:29
46.101.33.198 attack
 TCP (SYN) 46.101.33.198:51849 -> port 6608, len 44
2020-07-19 00:48:38
115.238.181.22 attackbotsspam
Invalid user ftpuser from 115.238.181.22 port 56702
2020-07-19 00:36:35
181.55.188.218 attack
Jul 18 17:25:42 ncomp sshd[31916]: Invalid user test from 181.55.188.218
Jul 18 17:25:42 ncomp sshd[31916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.55.188.218
Jul 18 17:25:42 ncomp sshd[31916]: Invalid user test from 181.55.188.218
Jul 18 17:25:45 ncomp sshd[31916]: Failed password for invalid user test from 181.55.188.218 port 41384 ssh2
2020-07-19 01:04:34
118.89.66.42 attack
Jul 19 02:19:28 localhost sshd[4037982]: Invalid user user from 118.89.66.42 port 60754
...
2020-07-19 00:35:39
105.144.124.52 proxy
تم سرقة حسابي في اميل
2020-07-19 01:10:26
116.105.216.30 attackspambots
Invalid user admin from 116.105.216.30 port 34646
2020-07-19 01:13:31
105.144.124.52 proxy
تم سرقة حسابي في اميل
2020-07-19 01:10:33
103.236.115.166 attackbots
Invalid user yifan from 103.236.115.166 port 36904
2020-07-19 00:40:05
41.223.142.211 attackspam
Jul 18 16:09:44 hosting sshd[1618]: Invalid user wangwei from 41.223.142.211 port 53360
...
2020-07-19 00:48:59

Recently Reported IPs

249.233.7.90 43.200.111.34 207.212.46.13 82.236.119.225
164.245.229.96 254.125.132.56 116.214.31.151 206.66.75.25
166.111.62.93 173.115.169.149 56.19.60.240 128.229.213.243
164.38.175.41 130.183.73.252 62.115.239.235 63.72.2.14
120.212.4.201 49.90.72.250 164.24.237.221 128.233.153.122