Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 173.142.145.120
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;173.142.145.120.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021000 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 13:55:30 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 120.145.142.173.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 120.145.142.173.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
123.148.246.117 attackspam
123.148.246.117 - - [27/Dec/2019:03:05:21 +0000] "POST /xmlrpc.php HTTP/1.1" 301 596 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
123.148.246.117 - - [27/Dec/2019:03:05:22 +0000] "POST /xmlrpc.php HTTP/1.1" 301 596 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
...
2020-03-03 23:40:37
178.93.9.178 attack
Dec  5 09:44:22 mercury auth[12599]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=josh@learnargentinianspanish.com rhost=178.93.9.178
...
2020-03-03 23:42:28
222.186.180.9 attackbots
Mar  3 15:56:39 nextcloud sshd\[20266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Mar  3 15:56:41 nextcloud sshd\[20266\]: Failed password for root from 222.186.180.9 port 50830 ssh2
Mar  3 15:56:45 nextcloud sshd\[20266\]: Failed password for root from 222.186.180.9 port 50830 ssh2
2020-03-03 23:03:52
5.196.70.107 attack
Mar  3 15:29:59 server sshd[868388]: Failed password for invalid user wp from 5.196.70.107 port 47222 ssh2
Mar  3 15:42:52 server sshd[872002]: Failed password for invalid user sshvpn from 5.196.70.107 port 36794 ssh2
Mar  3 15:55:48 server sshd[875560]: Failed password for invalid user www from 5.196.70.107 port 54584 ssh2
2020-03-03 23:00:25
142.4.204.122 attack
Mar  3 19:26:13 gw1 sshd[16790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.4.204.122
Mar  3 19:26:15 gw1 sshd[16790]: Failed password for invalid user radio from 142.4.204.122 port 34449 ssh2
...
2020-03-03 22:53:46
107.191.98.109 attack
suspicious action Tue, 03 Mar 2020 10:24:37 -0300
2020-03-03 23:01:57
165.16.96.91 attackspambots
Mar  3 14:24:23 h2177944 kernel: \[6439539.432926\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=165.16.96.91 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=28791 DF PROTO=TCP SPT=53893 DPT=60 WINDOW=14600 RES=0x00 SYN URGP=0 
Mar  3 14:24:23 h2177944 kernel: \[6439539.432941\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=165.16.96.91 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=28791 DF PROTO=TCP SPT=53893 DPT=60 WINDOW=14600 RES=0x00 SYN URGP=0 
Mar  3 14:24:24 h2177944 kernel: \[6439540.426049\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=165.16.96.91 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=28792 DF PROTO=TCP SPT=53893 DPT=60 WINDOW=14600 RES=0x00 SYN URGP=0 
Mar  3 14:24:24 h2177944 kernel: \[6439540.426063\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=165.16.96.91 DST=85.214.117.9 LEN=60 TOS=0x00 PREC=0x00 TTL=54 ID=28792 DF PROTO=TCP SPT=53893 DPT=60 WINDOW=14600 RES=0x00 SYN URGP=0 
Mar  3 14:24:26 h2177944 kernel: \[6439542.425690\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=165.16.96.91 DST=85.214.117.9
2020-03-03 23:21:55
45.179.173.252 attackbots
Mar  3 11:08:47 ws22vmsma01 sshd[69635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.179.173.252
Mar  3 11:08:49 ws22vmsma01 sshd[69635]: Failed password for invalid user anil from 45.179.173.252 port 47222 ssh2
...
2020-03-03 22:59:02
106.52.102.190 attackspam
Mar  3 05:08:37 hanapaa sshd\[26131\]: Invalid user zhusengbin from 106.52.102.190
Mar  3 05:08:37 hanapaa sshd\[26131\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.102.190
Mar  3 05:08:39 hanapaa sshd\[26131\]: Failed password for invalid user zhusengbin from 106.52.102.190 port 44925 ssh2
Mar  3 05:18:06 hanapaa sshd\[26919\]: Invalid user couchdb from 106.52.102.190
Mar  3 05:18:06 hanapaa sshd\[26919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.52.102.190
2020-03-03 23:33:05
103.39.158.206 attackspam
2020-01-24T12:07:12.692Z CLOSE host=103.39.158.206 port=52360 fd=4 time=210.187 bytes=309
...
2020-03-03 23:09:58
187.113.62.253 attack
Dec 24 16:15:50 mercury auth[481]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=josh@learnargentinianspanish.com rhost=187.113.62.253
...
2020-03-03 22:59:37
123.148.247.164 attackspam
123.148.247.164 - - [13/Dec/2019:03:06:05 +0000] "POST /xmlrpc.php HTTP/1.1" 301 596 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
123.148.247.164 - - [13/Dec/2019:03:06:06 +0000] "POST /xmlrpc.php HTTP/1.1" 301 596 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/63.0.3239.132 Safari/537.36"
...
2020-03-03 23:17:14
103.44.144.53 attackbots
2020-01-09T07:43:49.361Z CLOSE host=103.44.144.53 port=48564 fd=4 time=20.018 bytes=21
...
2020-03-03 22:56:17
107.180.111.13 attackspambots
Automatic report - XMLRPC Attack
2020-03-03 23:32:25
178.33.104.129 attackspam
Automatic report - SSH Brute-Force Attack
2020-03-03 23:28:10

Recently Reported IPs

94.74.95.109 191.85.40.77 246.199.109.253 152.202.40.249
231.35.140.15 54.167.0.185 81.239.2.95 64.253.28.20
216.10.96.140 217.5.216.244 255.68.28.117 142.104.17.219
114.1.207.1 133.235.108.66 87.40.175.175 234.242.41.46
88.119.58.148 82.21.71.91 60.217.36.217 235.51.130.84