Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 166.34.72.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;166.34.72.142.			IN	A

;; AUTHORITY SECTION:
.			530	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092201 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 23 04:16:27 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 142.72.34.166.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.72.34.166.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
83.110.73.13 attackspambots
1589578142 - 05/15/2020 23:29:02 Host: 83.110.73.13/83.110.73.13 Port: 445 TCP Blocked
2020-05-16 21:43:05
106.12.31.186 attackspambots
May 16 02:58:12 vpn01 sshd[30622]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.31.186
May 16 02:58:13 vpn01 sshd[30622]: Failed password for invalid user lliam from 106.12.31.186 port 32908 ssh2
...
2020-05-16 22:31:07
36.111.182.37 attackbots
srv02 SSH BruteForce Attacks 22 ..
2020-05-16 22:20:03
114.67.254.72 attack
2020-05-15T23:45:54.455659ns386461 sshd\[6938\]: Invalid user deploy from 114.67.254.72 port 50776
2020-05-15T23:45:54.460080ns386461 sshd\[6938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.254.72
2020-05-15T23:45:56.794491ns386461 sshd\[6938\]: Failed password for invalid user deploy from 114.67.254.72 port 50776 ssh2
2020-05-16T04:49:32.947555ns386461 sshd\[24826\]: Invalid user deploy from 114.67.254.72 port 54650
2020-05-16T04:49:32.952310ns386461 sshd\[24826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.254.72
...
2020-05-16 21:56:32
171.232.185.81 attackbotsspam
 TCP (SYN) 171.232.185.81:6803 -> port 9530, len 44
2020-05-16 21:41:22
36.152.38.149 attack
$f2bV_matches
2020-05-16 22:01:36
152.32.130.48 attackbotsspam
May 16 10:25:35 localhost sshd[2693971]: Invalid user admin from 152.32.130.48 port 46052
...
2020-05-16 22:14:53
106.12.195.99 attackspam
May 16 02:21:02 vpn01 sshd[29975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.195.99
May 16 02:21:04 vpn01 sshd[29975]: Failed password for invalid user work from 106.12.195.99 port 50612 ssh2
...
2020-05-16 22:24:09
218.13.1.186 attackspam
Invalid user webmail from 218.13.1.186 port 34872
2020-05-16 22:34:11
41.239.56.109 attack
May 16 02:36:39 scw-6657dc sshd[22415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.239.56.109
May 16 02:36:39 scw-6657dc sshd[22415]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.239.56.109
May 16 02:36:41 scw-6657dc sshd[22415]: Failed password for invalid user viviane from 41.239.56.109 port 53124 ssh2
...
2020-05-16 22:05:26
178.62.86.214 attackbots
CMS (WordPress or Joomla) login attempt.
2020-05-16 21:48:30
106.13.168.31 attack
SSH-BruteForce
2020-05-16 22:12:13
36.250.229.115 attackspambots
Invalid user share from 36.250.229.115 port 47954
2020-05-16 22:26:23
67.205.135.127 attackbots
May 16 04:36:53 rotator sshd\[901\]: Invalid user garibaldi from 67.205.135.127May 16 04:36:54 rotator sshd\[901\]: Failed password for invalid user garibaldi from 67.205.135.127 port 58974 ssh2May 16 04:40:27 rotator sshd\[1716\]: Invalid user user1 from 67.205.135.127May 16 04:40:29 rotator sshd\[1716\]: Failed password for invalid user user1 from 67.205.135.127 port 38038 ssh2May 16 04:44:00 rotator sshd\[1745\]: Invalid user userftp from 67.205.135.127May 16 04:44:01 rotator sshd\[1745\]: Failed password for invalid user userftp from 67.205.135.127 port 45326 ssh2
...
2020-05-16 22:04:00
139.170.150.250 attackspambots
Invalid user teampspeak3 from 139.170.150.250 port 10658
2020-05-16 22:23:40

Recently Reported IPs

191.185.216.217 224.227.19.199 161.154.6.247 14.185.37.53
23.191.179.211 213.90.27.12 249.163.12.66 37.209.173.55
110.2.23.83 102.20.106.189 1.103.21.35 101.0.202.248
109.223.2.36 180.72.175.70 240e:3a3:4c28:8620:3478:a0b9:9944:c08c 2001:250:4000:801c:8ee3:96e8:8740:d416
76.117.83.71 166.87.152.225 129.215.174.168 154.21.195.2