Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 174.20.142.113
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33553
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;174.20.142.113.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 238 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 22:01:52 CST 2025
;; MSG SIZE  rcvd: 107
Host info
113.142.20.174.in-addr.arpa domain name pointer 174-20-142-113.mpls.qwest.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
113.142.20.174.in-addr.arpa	name = 174-20-142-113.mpls.qwest.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
124.172.184.132 attackspam
firewall-block, port(s): 445/tcp
2019-07-19 15:03:55
112.28.77.215 attackbots
DATE:2019-07-19_08:01:33, IP:112.28.77.215, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-07-19 15:32:27
165.73.59.70 attack
Jul 15 03:01:53 srv01 sshd[1608]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165-73-59-70.ip.afrihost.joburg  user=jira
Jul 15 03:01:55 srv01 sshd[1608]: Failed password for jira from 165.73.59.70 port 41921 ssh2
Jul 15 03:01:57 srv01 sshd[1608]: Failed password for jira from 165.73.59.70 port 41921 ssh2
Jul 15 03:01:59 srv01 sshd[1608]: Failed password for jira from 165.73.59.70 port 41921 ssh2
Jul 15 03:02:01 srv01 sshd[1608]: Failed password for jira from 165.73.59.70 port 41921 ssh2
Jul 15 03:02:03 srv01 sshd[1608]: Failed password for jira from 165.73.59.70 port 41921 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=165.73.59.70
2019-07-19 14:57:13
81.33.134.46 attackbots
Unauthorized connection attempt from IP address 81.33.134.46 on Port 445(SMB)
2019-07-19 15:08:09
51.77.157.78 attackbotsspam
Jul 19 08:34:09 meumeu sshd[11056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.157.78 
Jul 19 08:34:11 meumeu sshd[11056]: Failed password for invalid user pp from 51.77.157.78 port 36506 ssh2
Jul 19 08:38:44 meumeu sshd[11817]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.157.78 
...
2019-07-19 14:49:52
105.235.116.254 attackspam
Jul 19 09:15:53 localhost sshd\[12599\]: Invalid user samba from 105.235.116.254 port 57716
Jul 19 09:15:53 localhost sshd\[12599\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=105.235.116.254
Jul 19 09:15:55 localhost sshd\[12599\]: Failed password for invalid user samba from 105.235.116.254 port 57716 ssh2
2019-07-19 15:26:27
220.130.222.156 attackspambots
Jul 19 07:42:44 debian sshd\[1057\]: Invalid user test from 220.130.222.156 port 42972
Jul 19 07:42:44 debian sshd\[1057\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.130.222.156
...
2019-07-19 14:50:49
218.92.0.175 attackspam
Jul 19 08:14:30 icinga sshd[46888]: Failed password for root from 218.92.0.175 port 5010 ssh2
Jul 19 08:14:33 icinga sshd[46888]: Failed password for root from 218.92.0.175 port 5010 ssh2
Jul 19 08:14:36 icinga sshd[46888]: Failed password for root from 218.92.0.175 port 5010 ssh2
Jul 19 08:14:42 icinga sshd[46888]: Failed password for root from 218.92.0.175 port 5010 ssh2
...
2019-07-19 15:11:44
84.123.13.17 attack
Jul 19 07:13:21 XXX sshd[3121]: Invalid user password from 84.123.13.17 port 64488
2019-07-19 15:22:52
65.189.1.108 attack
...
2019-07-19 15:15:23
60.54.84.69 attack
Jul 19 06:02:12 MK-Soft-VM7 sshd\[26119\]: Invalid user bouncer from 60.54.84.69 port 44104
Jul 19 06:02:12 MK-Soft-VM7 sshd\[26119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.54.84.69
Jul 19 06:02:14 MK-Soft-VM7 sshd\[26119\]: Failed password for invalid user bouncer from 60.54.84.69 port 44104 ssh2
...
2019-07-19 14:43:13
78.187.207.184 attack
Unauthorized connection attempt from IP address 78.187.207.184 on Port 445(SMB)
2019-07-19 14:47:34
106.13.105.77 attack
Jul 19 08:27:19 mail sshd\[21890\]: Invalid user ubuntu from 106.13.105.77 port 53940
Jul 19 08:27:19 mail sshd\[21890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.77
Jul 19 08:27:21 mail sshd\[21890\]: Failed password for invalid user ubuntu from 106.13.105.77 port 53940 ssh2
Jul 19 08:33:04 mail sshd\[22688\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.105.77  user=mysql
Jul 19 08:33:06 mail sshd\[22688\]: Failed password for mysql from 106.13.105.77 port 42528 ssh2
2019-07-19 14:41:50
139.162.99.58 attackspambots
firewall-block, port(s): 808/tcp
2019-07-19 15:02:04
81.22.45.25 attackspam
19.07.2019 06:58:04 Connection to port 8888 blocked by firewall
2019-07-19 15:01:09

Recently Reported IPs

222.208.167.201 6.56.42.129 24.224.202.231 84.219.66.128
236.2.194.175 45.164.251.251 217.248.64.231 86.50.224.230
46.174.122.176 31.239.248.158 55.38.209.10 210.68.63.102
43.23.190.238 153.58.29.238 65.245.21.214 133.204.131.215
216.250.233.207 22.72.119.58 28.49.96.249 41.157.171.115