Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Mexico City

Region: Mexico City

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 189.147.142.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54369
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;189.147.142.122.		IN	A

;; AUTHORITY SECTION:
.			473	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022071300 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 14 02:30:41 CST 2022
;; MSG SIZE  rcvd: 108
Host info
122.142.147.189.in-addr.arpa domain name pointer dsl-189-147-142-122-dyn.prod-infinitum.com.mx.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.142.147.189.in-addr.arpa	name = dsl-189-147-142-122-dyn.prod-infinitum.com.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.87.243.74 attack
Autoban   177.87.243.74 AUTH/CONNECT
2019-06-25 13:04:08
178.213.138.54 attackspam
Autoban   178.213.138.54 AUTH/CONNECT
2019-06-25 12:45:26
45.230.169.14 attackspam
Jun 25 04:05:21 nextcloud sshd\[19270\]: Invalid user bot from 45.230.169.14
Jun 25 04:05:21 nextcloud sshd\[19270\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.230.169.14
Jun 25 04:05:23 nextcloud sshd\[19270\]: Failed password for invalid user bot from 45.230.169.14 port 51360 ssh2
...
2019-06-25 12:27:50
177.84.56.17 attackspam
Autoban   177.84.56.17 AUTH/CONNECT
2019-06-25 13:07:03
177.81.94.253 attackspam
Autoban   177.81.94.253 AUTH/CONNECT
2019-06-25 13:09:30
2604:a880:400:d1::770:3001 attack
C1,DEF GET /wp-login.php
2019-06-25 12:44:23
122.228.19.79 attackspam
25.06.2019 04:44:45 Connection to port 2002 blocked by firewall
2019-06-25 12:47:47
149.202.148.185 attack
Jun 25 02:22:53 ns37 sshd[25970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.148.185
Jun 25 02:22:53 ns37 sshd[25970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.202.148.185
2019-06-25 12:37:56
51.77.221.191 attackbotsspam
Jun 25 01:39:10 hosting sshd[10925]: Invalid user braxton from 51.77.221.191 port 53488
...
2019-06-25 12:52:27
177.22.87.245 attackspambots
Port 3389 Scan
2019-06-25 12:58:12
178.32.51.215 attackspam
Autoban   178.32.51.215 AUTH/CONNECT
2019-06-25 12:39:00
177.70.64.115 attackspam
Autoban   177.70.64.115 AUTH/CONNECT
2019-06-25 13:19:26
178.141.193.2 attack
Autoban   178.141.193.2 AUTH/CONNECT
2019-06-25 12:53:50
116.62.217.151 attack
24.06.2019 22:01:28 Recursive DNS scan
2019-06-25 12:49:28
177.93.79.34 attackbotsspam
Autoban   177.93.79.34 AUTH/CONNECT
2019-06-25 13:02:59

Recently Reported IPs

189.147.163.122 189.131.242.175 170.150.2.181 177.184.75.150
61.31.89.127 177.116.141.236 189.217.197.111 144.168.154.29
37.44.254.192 66.152.181.139 177.81.50.125 177.140.21.175
177.24.159.188 177.37.126.54 201.193.160.6 144.168.152.117
190.30.212.154 144.168.253.114 196.188.18.248 66.36.234.181