Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Venezuela

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.122.221.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8726
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.122.221.142.		IN	A

;; AUTHORITY SECTION:
.			189	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 54 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 01:18:30 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 142.221.122.190.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.221.122.190.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.188.62.140 attackspambots
Tentative de connection abusive sur site Web Wordpress
2020-08-22 22:44:34
183.111.96.20 attack
2020-08-22T14:30:59.922504shield sshd\[11581\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20  user=root
2020-08-22T14:31:01.846186shield sshd\[11581\]: Failed password for root from 183.111.96.20 port 57806 ssh2
2020-08-22T14:35:11.773084shield sshd\[12550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20  user=root
2020-08-22T14:35:13.951913shield sshd\[12550\]: Failed password for root from 183.111.96.20 port 58874 ssh2
2020-08-22T14:39:31.225079shield sshd\[13519\]: Invalid user firewall from 183.111.96.20 port 60754
2020-08-22T14:39:31.231607shield sshd\[13519\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.96.20
2020-08-22 22:43:17
222.186.175.217 attackbotsspam
$f2bV_matches
2020-08-22 22:46:57
49.233.254.253 attackspam
SSH login attempts.
2020-08-22 22:19:49
118.25.144.49 attack
Aug 22 16:14:56 MainVPS sshd[8965]: Invalid user sftp_user from 118.25.144.49 port 56282
Aug 22 16:14:56 MainVPS sshd[8965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.144.49
Aug 22 16:14:56 MainVPS sshd[8965]: Invalid user sftp_user from 118.25.144.49 port 56282
Aug 22 16:14:58 MainVPS sshd[8965]: Failed password for invalid user sftp_user from 118.25.144.49 port 56282 ssh2
Aug 22 16:19:28 MainVPS sshd[17054]: Invalid user unknown from 118.25.144.49 port 49392
...
2020-08-22 23:00:26
49.232.166.190 attack
Aug 22 15:31:20 santamaria sshd\[6417\]: Invalid user ibc from 49.232.166.190
Aug 22 15:31:20 santamaria sshd\[6417\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.166.190
Aug 22 15:31:22 santamaria sshd\[6417\]: Failed password for invalid user ibc from 49.232.166.190 port 55266 ssh2
...
2020-08-22 22:32:55
47.9.196.230 attackspam
[-]:80 47.9.196.230 - - [22/Aug/2020:14:14:07 +0200] "GET / HTTP/1.1" 301 469 "http://anti-crisis-seo.com" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/74.0.3729.169 Safari/537.36"
2020-08-22 22:41:54
207.194.35.197 attack
2020-08-22T10:45:37.255633xentho-1 sshd[118103]: Invalid user jib from 207.194.35.197 port 55722
2020-08-22T10:45:39.387178xentho-1 sshd[118103]: Failed password for invalid user jib from 207.194.35.197 port 55722 ssh2
2020-08-22T10:46:46.518767xentho-1 sshd[118130]: Invalid user ov from 207.194.35.197 port 44518
2020-08-22T10:46:46.529512xentho-1 sshd[118130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.194.35.197
2020-08-22T10:46:46.518767xentho-1 sshd[118130]: Invalid user ov from 207.194.35.197 port 44518
2020-08-22T10:46:48.453928xentho-1 sshd[118130]: Failed password for invalid user ov from 207.194.35.197 port 44518 ssh2
2020-08-22T10:47:58.830966xentho-1 sshd[118146]: Invalid user joana from 207.194.35.197 port 33316
2020-08-22T10:47:58.841140xentho-1 sshd[118146]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.194.35.197
2020-08-22T10:47:58.830966xentho-1 sshd[118146]: Invalid user joa
...
2020-08-22 22:53:47
49.233.26.75 attackbots
SSH login attempts.
2020-08-22 22:18:52
106.52.55.146 attackbotsspam
Brute-force attempt banned
2020-08-22 22:52:17
49.232.152.3 attackspambots
SSH login attempts.
2020-08-22 22:37:26
180.76.109.16 attackspam
Aug 22 16:56:16 vps333114 sshd[8615]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.109.16
Aug 22 16:56:18 vps333114 sshd[8615]: Failed password for invalid user ftpadmin from 180.76.109.16 port 38952 ssh2
...
2020-08-22 22:51:00
222.186.180.41 attackspambots
2020-08-22T14:32:19.322697vps1033 sshd[14985]: Failed password for root from 222.186.180.41 port 62858 ssh2
2020-08-22T14:32:22.278308vps1033 sshd[14985]: Failed password for root from 222.186.180.41 port 62858 ssh2
2020-08-22T14:32:26.295156vps1033 sshd[14985]: Failed password for root from 222.186.180.41 port 62858 ssh2
2020-08-22T14:32:29.547313vps1033 sshd[14985]: Failed password for root from 222.186.180.41 port 62858 ssh2
2020-08-22T14:32:32.543595vps1033 sshd[14985]: Failed password for root from 222.186.180.41 port 62858 ssh2
...
2020-08-22 22:33:41
213.32.11.200 attackbots
Aug 22 12:50:41 onepixel sshd[2835425]: Invalid user kenji from 213.32.11.200 port 57710
Aug 22 12:50:41 onepixel sshd[2835425]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.32.11.200 
Aug 22 12:50:41 onepixel sshd[2835425]: Invalid user kenji from 213.32.11.200 port 57710
Aug 22 12:50:43 onepixel sshd[2835425]: Failed password for invalid user kenji from 213.32.11.200 port 57710 ssh2
Aug 22 12:54:56 onepixel sshd[2836168]: Invalid user hemant from 213.32.11.200 port 34905
2020-08-22 22:52:43
49.233.163.45 attackspam
SSH login attempts.
2020-08-22 22:26:04

Recently Reported IPs

61.254.107.40 203.89.27.150 196.25.96.72 81.163.8.51
185.163.110.101 180.188.237.170 117.251.61.171 184.168.97.210
42.225.207.247 115.171.251.130 174.105.11.97 203.223.44.206
43.224.183.135 201.158.24.117 142.91.118.12 1.36.227.231
46.23.137.62 88.255.101.230 47.93.33.151 122.116.94.122