Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.94.71.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22272
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.94.71.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025010602 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 07 13:08:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 142.71.94.197.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.71.94.197.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
128.199.197.161 spambotsattack
attack
2020-07-18 00:23:20
49.236.203.163 attackbotsspam
SSH bruteforce
2020-07-18 00:16:37
119.62.40.211 attackbotsspam
Port Scan
...
2020-07-17 23:48:02
176.67.80.9 attack
[2020-07-17 12:16:49] NOTICE[1277] chan_sip.c: Registration from '' failed for '176.67.80.9:49995' - Wrong password
[2020-07-17 12:16:49] SECURITY[1295] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-17T12:16:49.383-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="3293",SessionID="0x7f1754378da8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/176.67.80.9/49995",Challenge="01a66c1a",ReceivedChallenge="01a66c1a",ReceivedHash="eb9d2f0ca6f8f17f7b06d73a2a04aea7"
[2020-07-17 12:17:21] NOTICE[1277] chan_sip.c: Registration from '' failed for '176.67.80.9:50731' - Wrong password
[2020-07-17 12:17:21] SECURITY[1295] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-17T12:17:21.557-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="5072",SessionID="0x7f1754378da8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/176.67.80.9/50731",
...
2020-07-18 00:21:46
104.131.98.146 attack
Jul 17 12:12:20 NPSTNNYC01T sshd[12216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.98.146
Jul 17 12:12:22 NPSTNNYC01T sshd[12216]: Failed password for invalid user liuqiang from 104.131.98.146 port 43920 ssh2
Jul 17 12:16:44 NPSTNNYC01T sshd[12538]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.98.146
...
2020-07-18 00:19:24
107.175.33.240 attack
Jul 17 17:07:31 minden010 sshd[5051]: Failed password for web1 from 107.175.33.240 port 57768 ssh2
Jul 17 17:12:05 minden010 sshd[6690]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.175.33.240
Jul 17 17:12:07 minden010 sshd[6690]: Failed password for invalid user cl from 107.175.33.240 port 52004 ssh2
...
2020-07-17 23:50:09
61.177.172.54 attackspambots
Jul 17 16:40:43 ajax sshd[7294]: Failed password for root from 61.177.172.54 port 48824 ssh2
Jul 17 16:40:48 ajax sshd[7294]: Failed password for root from 61.177.172.54 port 48824 ssh2
2020-07-17 23:46:00
120.34.183.58 attackspam
Brute force attempt
2020-07-18 00:08:35
43.252.229.118 attackspambots
prod6
...
2020-07-17 23:42:01
222.186.30.112 attackspam
Unauthorised connection attempt detected at AUO MAIN. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-17 23:57:35
139.59.87.250 attackspambots
$f2bV_matches
2020-07-17 23:54:34
185.143.73.171 attack
2020-07-17 15:56:50 auth_plain authenticator failed for (User) [185.143.73.171]: 535 Incorrect authentication data (set_id=recruitment@csmailer.org)
2020-07-17 15:57:17 auth_plain authenticator failed for (User) [185.143.73.171]: 535 Incorrect authentication data (set_id=hazel@csmailer.org)
2020-07-17 15:57:44 auth_plain authenticator failed for (User) [185.143.73.171]: 535 Incorrect authentication data (set_id=handjob@csmailer.org)
2020-07-17 15:58:11 auth_plain authenticator failed for (User) [185.143.73.171]: 535 Incorrect authentication data (set_id=alberto@csmailer.org)
2020-07-17 15:58:39 auth_plain authenticator failed for (User) [185.143.73.171]: 535 Incorrect authentication data (set_id=tupu@csmailer.org)
...
2020-07-18 00:02:44
170.210.83.119 spambotsattack
attack
2020-07-18 00:19:05
111.92.240.206 attack
111.92.240.206 - - [17/Jul/2020:17:47:44 +0200] "POST /wp-login.php HTTP/1.1" 200 3434 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-17 23:58:58
117.69.189.14 attack
Jul 17 18:00:01 srv01 postfix/smtpd\[12845\]: warning: unknown\[117.69.189.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 18:03:33 srv01 postfix/smtpd\[11249\]: warning: unknown\[117.69.189.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 18:03:45 srv01 postfix/smtpd\[11249\]: warning: unknown\[117.69.189.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 18:04:02 srv01 postfix/smtpd\[11249\]: warning: unknown\[117.69.189.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 17 18:04:20 srv01 postfix/smtpd\[11249\]: warning: unknown\[117.69.189.14\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-07-18 00:14:24

Recently Reported IPs

218.108.28.106 131.2.250.231 142.242.128.106 251.252.197.89
59.91.173.24 208.103.97.92 154.139.154.237 90.81.193.50
94.73.85.138 204.81.10.93 45.164.0.231 92.157.143.110
34.135.39.169 142.81.72.121 20.19.116.137 247.31.3.72
16.51.234.216 159.167.95.153 203.138.76.65 155.12.129.246