Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lathen

Region: Lower Saxony

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
178.142.187.237 attack
Jul 15 17:16:35 webhost01 sshd[5059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.142.187.237
...
2020-07-15 18:39:23
178.142.126.34 attackspambots
May 21 01:44:34 pl3server sshd[27297]: Invalid user pi from 178.142.126.34 port 57838
May 21 01:44:34 pl3server sshd[27298]: Invalid user pi from 178.142.126.34 port 57840
May 21 01:44:34 pl3server sshd[27297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.142.126.34
May 21 01:44:34 pl3server sshd[27298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.142.126.34
May 21 01:44:36 pl3server sshd[27297]: Failed password for invalid user pi from 178.142.126.34 port 57838 ssh2
May 21 01:44:37 pl3server sshd[27298]: Failed password for invalid user pi from 178.142.126.34 port 57840 ssh2
May 21 01:44:37 pl3server sshd[27297]: Connection closed by 178.142.126.34 port 57838 [preauth]
May 21 01:44:37 pl3server sshd[27298]: Connection closed by 178.142.126.34 port 57840 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.142.126.34
2020-05-21 08:20:25
178.142.123.100 attackbots
Mar 31 05:54:22 v22019038103785759 sshd\[21140\]: Invalid user pi from 178.142.123.100 port 56300
Mar 31 05:54:22 v22019038103785759 sshd\[21140\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.142.123.100
Mar 31 05:54:22 v22019038103785759 sshd\[21142\]: Invalid user pi from 178.142.123.100 port 56316
Mar 31 05:54:22 v22019038103785759 sshd\[21142\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.142.123.100
Mar 31 05:54:24 v22019038103785759 sshd\[21140\]: Failed password for invalid user pi from 178.142.123.100 port 56300 ssh2
...
2020-03-31 13:22:57
178.142.123.103 attackspambots
DATE:2020-03-18 23:09:43, IP:178.142.123.103, PORT:ssh SSH brute force auth on honeypot server (epe-honey1-hq)
2020-03-19 09:04:28
178.142.127.33 attackspam
unauthorized connection attempt
2020-02-07 20:04:21
178.142.167.178 attackbotsspam
Automatic report - Port Scan Attack
2019-12-13 19:42:24
178.142.175.110 attackbots
Automatic report - Port Scan Attack
2019-11-19 15:32:43
178.142.174.210 attack
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/178.142.174.210/ 
 
 DE - 1H : (71)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : DE 
 NAME ASN : ASN9145 
 
 IP : 178.142.174.210 
 
 CIDR : 178.142.0.0/16 
 
 PREFIX COUNT : 38 
 
 UNIQUE IP COUNT : 768768 
 
 
 ATTACKS DETECTED ASN9145 :  
  1H - 1 
  3H - 1 
  6H - 3 
 12H - 3 
 24H - 11 
 
 DateTime : 2019-10-29 12:38:32 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-29 22:28:16
178.142.167.17 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/178.142.167.17/ 
 
 DE - 1H : (59)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : DE 
 NAME ASN : ASN9145 
 
 IP : 178.142.167.17 
 
 CIDR : 178.142.0.0/16 
 
 PREFIX COUNT : 38 
 
 UNIQUE IP COUNT : 768768 
 
 
 ATTACKS DETECTED ASN9145 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 3 
 
 DateTime : 2019-10-24 05:51:20 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-24 15:26:18
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.142.1.11
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46123
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;178.142.1.11.			IN	A

;; AUTHORITY SECTION:
.			387	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019122402 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 25 04:46:45 CST 2019
;; MSG SIZE  rcvd: 116
Host info
11.1.142.178.in-addr.arpa domain name pointer dyndsl-178-142-001-011.ewe-ip-backbone.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
11.1.142.178.in-addr.arpa	name = dyndsl-178-142-001-011.ewe-ip-backbone.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.73.51.81 attackbotsspam
Mar  6 06:32:45 mail.srvfarm.net postfix/smtpd[1942014]: NOQUEUE: reject: RCPT from unknown[134.73.51.81]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 06:32:52 mail.srvfarm.net postfix/smtpd[1942016]: NOQUEUE: reject: RCPT from unknown[134.73.51.81]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 06:34:59 mail.srvfarm.net postfix/smtpd[1944759]: NOQUEUE: reject: RCPT from unknown[134.73.51.81]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 06:35:08 mail.srvfarm.net postfix/smtpd[1942017]: NOQUEUE: reject: RCPT from unknown[134.73.51.81]:
2020-03-06 18:42:12
185.211.245.198 attackspambots
Mar  6 10:34:20 mail postfix/smtpd\[1634\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: \
Mar  6 10:34:20 mail postfix/smtpd\[1417\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: \
Mar  6 11:23:04 mail postfix/smtpd\[2705\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: \
Mar  6 11:23:04 mail postfix/smtpd\[2499\]: warning: unknown\[185.211.245.198\]: SASL PLAIN authentication failed: \
2020-03-06 18:40:40
89.248.168.202 attackspam
Automatic report - Port Scan
2020-03-06 18:18:50
178.33.216.187 attackspam
Mar  6 10:21:02 host sshd[47255]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=onion2.hosting.ovh.web-et-solutions.com  user=root
Mar  6 10:21:04 host sshd[47255]: Failed password for root from 178.33.216.187 port 41260 ssh2
...
2020-03-06 18:51:12
152.32.187.51 attackbots
Tried sshing with brute force.
2020-03-06 18:57:49
208.187.167.77 attack
Mar  6 05:31:28 mail.srvfarm.net postfix/smtpd[1923012]: NOQUEUE: reject: RCPT from unknown[208.187.167.77]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 05:31:35 mail.srvfarm.net postfix/smtpd[1924586]: NOQUEUE: reject: RCPT from unknown[208.187.167.77]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 05:31:37 mail.srvfarm.net postfix/smtpd[1924634]: NOQUEUE: reject: RCPT from unknown[208.187.167.77]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 05:31:47 mail.srvfarm.net postfix/smtpd[1924638]: NOQUEUE: reject: RCPT from unknown[208.1
2020-03-06 18:38:44
202.56.94.26 attack
Email rejected due to spam filtering
2020-03-06 18:20:29
91.214.114.7 attackspambots
Mar  6 11:51:46 vps647732 sshd[27398]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.214.114.7
Mar  6 11:51:48 vps647732 sshd[27398]: Failed password for invalid user git from 91.214.114.7 port 52654 ssh2
...
2020-03-06 18:55:28
140.213.41.15 attackspambots
140.213.41.15 - admin \[05/Mar/2020:20:51:06 -0800\] "GET /rss/catalog/notifystock/ HTTP/1.1" 401 25140.213.41.15 - - \[05/Mar/2020:20:51:06 -0800\] "POST /index.php/admin/sales_order/ HTTP/1.1" 404 20622140.213.41.15 - - \[05/Mar/2020:20:51:06 -0800\] "POST /index.php/admin HTTP/1.1" 404 20570
...
2020-03-06 18:56:41
45.125.65.35 attackspam
2020-03-06 11:14:25 dovecot_login authenticator failed for \(User\) \[45.125.65.35\]: 535 Incorrect authentication data \(set_id=marcus\)
2020-03-06 11:15:48 dovecot_login authenticator failed for \(User\) \[45.125.65.35\]: 535 Incorrect authentication data \(set_id=marcus\)
2020-03-06 11:15:53 dovecot_login authenticator failed for \(User\) \[45.125.65.35\]: 535 Incorrect authentication data \(set_id=marcus\)
2020-03-06 11:15:53 dovecot_login authenticator failed for \(User\) \[45.125.65.35\]: 535 Incorrect authentication data \(set_id=marcus\)
2020-03-06 11:21:52 dovecot_login authenticator failed for \(User\) \[45.125.65.35\]: 535 Incorrect authentication data \(set_id=sweet\)
...
2020-03-06 18:25:44
137.74.172.1 attack
Mar  6 16:00:12 itv-usvr-01 sshd[23671]: Invalid user invite from 137.74.172.1
Mar  6 16:00:12 itv-usvr-01 sshd[23671]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=137.74.172.1
Mar  6 16:00:12 itv-usvr-01 sshd[23671]: Invalid user invite from 137.74.172.1
Mar  6 16:00:13 itv-usvr-01 sshd[23671]: Failed password for invalid user invite from 137.74.172.1 port 42144 ssh2
Mar  6 16:06:46 itv-usvr-01 sshd[23931]: Invalid user ts from 137.74.172.1
2020-03-06 18:58:32
106.52.79.201 attackbots
Invalid user nicole from 106.52.79.201 port 47578
2020-03-06 18:52:29
134.73.51.131 attackspam
Mar  6 05:47:02 mail.srvfarm.net postfix/smtpd[1928546]: NOQUEUE: reject: RCPT from unknown[134.73.51.131]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 05:47:05 mail.srvfarm.net postfix/smtpd[1928549]: NOQUEUE: reject: RCPT from unknown[134.73.51.131]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 05:47:19 mail.srvfarm.net postfix/smtpd[1929711]: NOQUEUE: reject: RCPT from unknown[134.73.51.131]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar  6 05:47:30 mail.srvfarm.net postfix/smtpd[1923662]: NOQUEUE: reject: RCPT from unknown[134.73.51.131]:
2020-03-06 18:36:32
85.117.66.55 attackspambots
Email rejected due to spam filtering
2020-03-06 18:29:02
37.150.232.170 attackbotsspam
Email rejected due to spam filtering
2020-03-06 18:28:17

Recently Reported IPs

97.75.234.112 196.97.173.86 128.189.185.166 49.49.248.235
191.199.128.254 76.18.240.61 46.17.105.229 14.163.141.14
111.138.59.237 78.156.132.241 34.221.79.222 200.247.45.78
124.126.71.159 102.173.150.41 183.81.96.101 151.238.128.71
56.147.3.170 156.254.204.192 111.119.178.189 122.110.76.181