Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Uruguay

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 186.52.95.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30244
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;186.52.95.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 12:31:56 CST 2025
;; MSG SIZE  rcvd: 106
Host info
142.95.52.186.in-addr.arpa domain name pointer r186-52-95-142.dialup.adsl.anteldata.net.uy.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.95.52.186.in-addr.arpa	name = r186-52-95-142.dialup.adsl.anteldata.net.uy.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
83.96.6.210 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-19 04:35:17,621 INFO [amun_request_handler] PortScan Detected on Port: 445 (83.96.6.210)
2019-07-19 16:38:43
198.20.103.242 attack
Unauthorized attempts to login - multiple attempts.  Reported to the security department of the company owning the address.
2019-07-19 17:23:56
158.69.240.189 attackbotsspam
\[2019-07-19 05:16:00\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-19T05:16:00.429-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="25800046423112926",SessionID="0x7f06f82756a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/158.69.240.189/19996",ACLName="no_extension_match"
\[2019-07-19 05:19:04\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-19T05:19:04.007-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="25800246423112926",SessionID="0x7f06f805d238",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/158.69.240.189/16029",ACLName="no_extension_match"
\[2019-07-19 05:20:36\] SECURITY\[20812\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-07-19T05:20:36.230-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="25800346423112926",SessionID="0x7f06f823f758",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/158.69.240.189/19403",ACL
2019-07-19 17:42:19
149.56.129.68 attackspambots
Jul 19 10:44:58 vps647732 sshd[4439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.129.68
Jul 19 10:45:01 vps647732 sshd[4439]: Failed password for invalid user teste from 149.56.129.68 port 34208 ssh2
...
2019-07-19 16:45:44
113.104.197.114 attackbots
Automatic report - Port Scan Attack
2019-07-19 17:01:52
114.77.70.116 attack
Automatic report - Port Scan Attack
2019-07-19 17:13:17
59.28.2.101 attack
Jul 19 12:54:17 itv-usvr-02 sshd[14072]: Invalid user admin from 59.28.2.101 port 40920
Jul 19 12:54:17 itv-usvr-02 sshd[14072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.28.2.101
Jul 19 12:54:17 itv-usvr-02 sshd[14072]: Invalid user admin from 59.28.2.101 port 40920
Jul 19 12:54:19 itv-usvr-02 sshd[14072]: Failed password for invalid user admin from 59.28.2.101 port 40920 ssh2
Jul 19 12:57:24 itv-usvr-02 sshd[14162]: Invalid user ubuntu from 59.28.2.101 port 41860
2019-07-19 17:18:39
118.174.45.29 attackbotsspam
Jul 19 10:51:55 MK-Soft-Root2 sshd\[27587\]: Invalid user lia from 118.174.45.29 port 52964
Jul 19 10:51:55 MK-Soft-Root2 sshd\[27587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29
Jul 19 10:51:57 MK-Soft-Root2 sshd\[27587\]: Failed password for invalid user lia from 118.174.45.29 port 52964 ssh2
...
2019-07-19 16:55:07
45.79.152.7 attackspambots
Automatic report - Port Scan Attack
2019-07-19 17:43:43
195.114.7.230 attackbotsspam
Trying ports that it shouldn't be.
2019-07-19 17:12:00
128.199.197.53 attackspambots
Jul 19 10:28:19 mail sshd\[11685\]: Invalid user amber from 128.199.197.53 port 57759
Jul 19 10:28:19 mail sshd\[11685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.197.53
...
2019-07-19 17:37:42
177.118.136.118 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-19 04:33:20,090 INFO [amun_request_handler] PortScan Detected on Port: 445 (177.118.136.118)
2019-07-19 17:06:30
78.165.101.10 attackbots
port scan and connect, tcp 80 (http)
2019-07-19 17:03:46
50.67.178.164 attackbotsspam
Jul 19 10:26:16 legacy sshd[29779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.67.178.164
Jul 19 10:26:18 legacy sshd[29779]: Failed password for invalid user ftp_user from 50.67.178.164 port 36386 ssh2
Jul 19 10:33:41 legacy sshd[30044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.67.178.164
...
2019-07-19 16:41:02
74.94.246.82 attack
Jul 19 11:03:10 vps691689 sshd[27744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.94.246.82
Jul 19 11:03:11 vps691689 sshd[27744]: Failed password for invalid user angelica from 74.94.246.82 port 54386 ssh2
Jul 19 11:07:58 vps691689 sshd[27818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.94.246.82
...
2019-07-19 17:09:10

Recently Reported IPs

229.2.71.217 225.194.52.70 4.88.37.220 157.119.1.39
157.245.32.228 64.216.120.1 114.8.119.137 95.183.204.79
24.207.150.112 243.49.94.211 231.107.47.223 82.38.96.15
33.53.237.8 204.231.240.196 131.85.145.70 41.3.142.63
170.111.118.72 212.129.28.113 188.68.42.214 195.218.17.19