Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Tanzania, the United Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.45.159.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;196.45.159.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012902 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 30 12:47:35 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 142.159.45.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.159.45.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
104.248.174.126 attackspambots
Brute force SMTP login attempted.
...
2019-08-27 16:46:56
209.85.222.45 attack
2019-08-2711:10:301i2XUk-0006SO-FJ\<=customercare@bfclcoin.comH=mail-vk1-f182.google.com[209.85.221.182]:44903P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128CV=noA=dovecot_plain:customercare@bfclcoin.comS=8452id=CA njbaz-wihs0p00jxF65L82qgwZ96syYiGvUxuob8ToN7yskA@mail.gmail.comT="Re:Utili\,interessinonerogati"forpariko1976@gmail.com2019-08-2711:07:381i2XRy-0006Q7-CE\<=customercare@bfclcoin.comH=mail-vk1-f173.google.com[209.85.221.173]:40052P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128CV=noA=dovecot_plain:customercare@bfclcoin.comS=7439id=CA njbazELX7z1MkAoTjAbMayniRfZPyYbyC_ZpnwQ8cZDmX dQ@mail.gmail.comT="Re:"forneri1975@libero.it2019-08-2711:06:481i2XRA-0006Pc-I9\<=customercare@bfclcoin.comH=mail-ua1-f45.google.com[209.85.222.45]:36099P=esmtpsaX=TLSv1.2:ECDHE-RSA-AES128-GCM-SHA256:128CV=noA=dovecot_plain:customercare@bfclcoin.comS=7485id=CA njbazz971XXc84T5q Lxyc35netGy9ygLpRzqYdwqmO6tr3A@mail.gmail.comT="Re:Sollecitoaccreditobitmeex"forroberta1989.dessi@gmail.com2019-08-2711:09:191i2XTb-0006RO
2019-08-27 17:10:46
89.248.162.247 attackbotsspam
08/27/2019-05:19:37.482085 89.248.162.247 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-27 17:20:59
114.6.68.30 attackspambots
SSH invalid-user multiple login try
2019-08-27 17:24:08
101.254.175.237 attackbots
postfix-failedauth jail [ma]
2019-08-27 17:43:39
40.73.59.55 attackspam
Aug 26 23:04:54 kapalua sshd\[23656\]: Invalid user refog from 40.73.59.55
Aug 26 23:04:54 kapalua sshd\[23656\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.59.55
Aug 26 23:04:56 kapalua sshd\[23656\]: Failed password for invalid user refog from 40.73.59.55 port 37360 ssh2
Aug 26 23:10:30 kapalua sshd\[24439\]: Invalid user benson from 40.73.59.55
Aug 26 23:10:30 kapalua sshd\[24439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.59.55
2019-08-27 17:16:52
46.164.252.137 attackspam
Unauthorized connection attempt from IP address 46.164.252.137 on Port 445(SMB)
2019-08-27 16:55:25
61.154.64.254 attackspam
Bad Postfix AUTH attempts
...
2019-08-27 17:20:28
187.174.102.130 attackspambots
Unauthorized connection attempt from IP address 187.174.102.130 on Port 445(SMB)
2019-08-27 17:06:40
45.64.113.101 attackspambots
Aug 27 04:37:48 ny01 sshd[18142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.64.113.101
Aug 27 04:37:50 ny01 sshd[18142]: Failed password for invalid user pimp from 45.64.113.101 port 59026 ssh2
Aug 27 04:42:22 ny01 sshd[18881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.64.113.101
2019-08-27 16:52:57
165.22.251.90 attackspam
Aug 26 23:05:47 lcdev sshd\[324\]: Invalid user marcus from 165.22.251.90
Aug 26 23:05:47 lcdev sshd\[324\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.251.90
Aug 26 23:05:49 lcdev sshd\[324\]: Failed password for invalid user marcus from 165.22.251.90 port 50812 ssh2
Aug 26 23:10:28 lcdev sshd\[979\]: Invalid user u from 165.22.251.90
Aug 26 23:10:28 lcdev sshd\[979\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.251.90
2019-08-27 17:18:55
60.250.164.169 attack
Aug 27 14:41:09 areeb-Workstation sshd\[30869\]: Invalid user tomcat from 60.250.164.169
Aug 27 14:41:09 areeb-Workstation sshd\[30869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.250.164.169
Aug 27 14:41:11 areeb-Workstation sshd\[30869\]: Failed password for invalid user tomcat from 60.250.164.169 port 36268 ssh2
...
2019-08-27 17:12:19
139.59.85.59 attackspambots
Aug 27 09:10:17 marvibiene sshd[37265]: Invalid user garret from 139.59.85.59 port 35764
Aug 27 09:10:17 marvibiene sshd[37265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.85.59
Aug 27 09:10:17 marvibiene sshd[37265]: Invalid user garret from 139.59.85.59 port 35764
Aug 27 09:10:19 marvibiene sshd[37265]: Failed password for invalid user garret from 139.59.85.59 port 35764 ssh2
...
2019-08-27 17:27:25
197.51.1.4 attackbotsspam
Aug 27 12:10:05 srv-4 sshd\[20129\]: Invalid user admin from 197.51.1.4
Aug 27 12:10:05 srv-4 sshd\[20129\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.51.1.4
Aug 27 12:10:07 srv-4 sshd\[20129\]: Failed password for invalid user admin from 197.51.1.4 port 46352 ssh2
...
2019-08-27 17:44:09
177.154.238.78 attack
$f2bV_matches
2019-08-27 17:26:47

Recently Reported IPs

167.57.233.249 56.132.244.39 248.181.254.118 80.101.144.2
245.115.186.113 114.132.212.137 135.91.252.175 152.233.44.79
144.143.37.253 7.94.126.92 64.153.104.33 81.173.37.38
106.39.27.18 194.209.138.68 148.239.64.137 252.41.127.84
26.123.247.21 239.85.47.159 88.192.184.104 170.109.43.55