Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Buk-gu

Region: Gwangju

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 168.131.147.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16474
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;168.131.147.142.		IN	A

;; AUTHORITY SECTION:
.			160	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061901 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 20 18:53:20 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 142.147.131.168.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 168.131.147.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
119.178.42.90 attackbots
unauthorized connection attempt
2020-01-12 13:03:33
180.250.69.213 attack
Jan 12 01:52:58 sso sshd[29769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.69.213
Jan 12 01:53:00 sso sshd[29769]: Failed password for invalid user yoko from 180.250.69.213 port 51198 ssh2
...
2020-01-12 08:59:42
68.183.4.129 attack
Jan 12 05:57:30 amit sshd\[4283\]: Invalid user duplicity from 68.183.4.129
Jan 12 05:57:30 amit sshd\[4283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.4.129
Jan 12 05:57:32 amit sshd\[4283\]: Failed password for invalid user duplicity from 68.183.4.129 port 50202 ssh2
...
2020-01-12 13:10:14
222.124.149.138 attackbotsspam
$f2bV_matches
2020-01-12 09:10:22
115.212.99.170 attack
2020-01-11 15:02:26 dovecot_login authenticator failed for (mbikd) [115.212.99.170]:51570 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhangwenbo@lerctr.org)
2020-01-11 15:02:33 dovecot_login authenticator failed for (noxaw) [115.212.99.170]:51570 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhangwenbo@lerctr.org)
2020-01-11 15:02:46 dovecot_login authenticator failed for (onwkn) [115.212.99.170]:51570 I=[192.147.25.65]:25: 535 Incorrect authentication data (set_id=zhangwenbo@lerctr.org)
...
2020-01-12 09:09:10
170.246.160.98 attack
unauthorized connection attempt
2020-01-12 13:07:31
47.53.67.205 attackspambots
Automatic report - Port Scan Attack
2020-01-12 13:17:28
14.186.136.220 attackbotsspam
Jan 11 21:57:50 pl3server sshd[14397]: Address 14.186.136.220 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jan 11 21:57:50 pl3server sshd[14397]: Invalid user admin from 14.186.136.220
Jan 11 21:57:50 pl3server sshd[14397]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.186.136.220
Jan 11 21:57:52 pl3server sshd[14397]: Failed password for invalid user admin from 14.186.136.220 port 42379 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=14.186.136.220
2020-01-12 09:01:27
37.6.77.39 attackspam
Telnet/23 MH Probe, BF, Hack -
2020-01-12 08:53:49
177.20.224.176 attackspam
unauthorized connection attempt
2020-01-12 13:15:12
222.186.180.41 attackspam
Jan 11 14:51:15 hanapaa sshd\[30691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Jan 11 14:51:17 hanapaa sshd\[30691\]: Failed password for root from 222.186.180.41 port 59526 ssh2
Jan 11 14:51:33 hanapaa sshd\[30700\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Jan 11 14:51:35 hanapaa sshd\[30700\]: Failed password for root from 222.186.180.41 port 15754 ssh2
Jan 11 14:51:45 hanapaa sshd\[30700\]: Failed password for root from 222.186.180.41 port 15754 ssh2
2020-01-12 09:03:53
177.170.188.147 attackbots
unauthorized connection attempt
2020-01-12 13:03:02
206.189.132.204 attackspam
(sshd) Failed SSH login from 206.189.132.204 (IN/India/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jan 12 01:37:13 blur sshd[3830]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.132.204  user=root
Jan 12 01:37:15 blur sshd[3830]: Failed password for root from 206.189.132.204 port 45644 ssh2
Jan 12 01:39:21 blur sshd[4239]: Invalid user applmgr from 206.189.132.204 port 37412
Jan 12 01:39:23 blur sshd[4239]: Failed password for invalid user applmgr from 206.189.132.204 port 37412 ssh2
Jan 12 01:41:39 blur sshd[4653]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.132.204  user=root
2020-01-12 08:54:40
31.163.186.95 attackspambots
Fail2Ban Ban Triggered
2020-01-12 13:02:00
115.221.211.156 attackbotsspam
Bad Postfix AUTH attempts
2020-01-12 09:08:16

Recently Reported IPs

240.219.158.207 213.239.205.184 188.174.155.143 29.74.122.171
0.114.166.3 158.69.225.77 29.194.183.126 233.104.104.217
145.31.176.23 93.158.75.1 213.192.54.62 129.166.178.91
213.192.54.135 18.179.149.109 144.76.84.138 66.163.161.89
114.213.22.0 60.216.9.32 134.61.109.141 199.8.81.109