Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 20.0.168.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 595
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;20.0.168.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 22:59:02 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 142.168.0.20.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.168.0.20.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
175.100.139.179 attackbotsspam
175.100.139.179 - [25/Aug/2020:06:50:23 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
175.100.139.179 - [25/Aug/2020:06:51:25 +0300] "POST /xmlrpc.php HTTP/1.1" 404 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)" "-"
...
2020-08-25 17:49:19
51.91.102.99 attackbots
sshd: Failed password for invalid user .... from 51.91.102.99 port 58148 ssh2 (3 attempts)
2020-08-25 18:00:10
45.227.255.4 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-08-25 17:36:05
94.229.66.131 attackbots
Aug 25 05:46:43 v22019038103785759 sshd\[22554\]: Invalid user mysqluser from 94.229.66.131 port 52056
Aug 25 05:46:43 v22019038103785759 sshd\[22554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.229.66.131
Aug 25 05:46:44 v22019038103785759 sshd\[22554\]: Failed password for invalid user mysqluser from 94.229.66.131 port 52056 ssh2
Aug 25 05:51:03 v22019038103785759 sshd\[23412\]: Invalid user william from 94.229.66.131 port 50484
Aug 25 05:51:03 v22019038103785759 sshd\[23412\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.229.66.131
...
2020-08-25 18:04:41
189.7.81.29 attack
Aug 25 11:23:26 vps333114 sshd[13851]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.7.81.29
Aug 25 11:23:28 vps333114 sshd[13851]: Failed password for invalid user galina from 189.7.81.29 port 45000 ssh2
...
2020-08-25 17:51:51
103.84.130.130 attackbotsspam
Aug 25 11:18:50 MainVPS sshd[12907]: Invalid user catalin from 103.84.130.130 port 43254
Aug 25 11:18:50 MainVPS sshd[12907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.130.130
Aug 25 11:18:50 MainVPS sshd[12907]: Invalid user catalin from 103.84.130.130 port 43254
Aug 25 11:18:52 MainVPS sshd[12907]: Failed password for invalid user catalin from 103.84.130.130 port 43254 ssh2
Aug 25 11:25:20 MainVPS sshd[24513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.84.130.130  user=root
Aug 25 11:25:22 MainVPS sshd[24513]: Failed password for root from 103.84.130.130 port 48038 ssh2
...
2020-08-25 18:01:15
157.245.101.176 attackspam
Aug 25 07:54:18 OPSO sshd\[12735\]: Invalid user torus from 157.245.101.176 port 36736
Aug 25 07:54:18 OPSO sshd\[12735\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.101.176
Aug 25 07:54:20 OPSO sshd\[12735\]: Failed password for invalid user torus from 157.245.101.176 port 36736 ssh2
Aug 25 07:59:00 OPSO sshd\[13729\]: Invalid user sts from 157.245.101.176 port 46038
Aug 25 07:59:00 OPSO sshd\[13729\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.101.176
2020-08-25 17:48:21
200.73.240.238 attackspambots
Aug 25 06:43:59 firewall sshd[24717]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.240.238
Aug 25 06:43:59 firewall sshd[24717]: Invalid user postgres from 200.73.240.238
Aug 25 06:44:00 firewall sshd[24717]: Failed password for invalid user postgres from 200.73.240.238 port 51694 ssh2
...
2020-08-25 17:53:22
185.220.102.250 attack
SSH Brute-Force attacks
2020-08-25 18:07:56
222.186.175.150 attackbots
Aug 25 11:55:33 ip106 sshd[28370]: Failed password for root from 222.186.175.150 port 3336 ssh2
Aug 25 11:55:38 ip106 sshd[28370]: Failed password for root from 222.186.175.150 port 3336 ssh2
...
2020-08-25 17:59:26
92.145.226.69 attackbots
Aug 25 10:46:17 vpn01 sshd[14148]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.145.226.69
Aug 25 10:46:19 vpn01 sshd[14148]: Failed password for invalid user kenji from 92.145.226.69 port 42810 ssh2
...
2020-08-25 17:45:59
111.90.141.148 attackspam
111.90.141.148 - - [25/Aug/2020:05:51:30 +0200] "POST /xmlrpc.php HTTP/1.1" 403 31178 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
111.90.141.148 - - [25/Aug/2020:05:51:31 +0200] "POST /xmlrpc.php HTTP/1.1" 403 31178 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/60.0.3112.113 Safari/537.36"
...
2020-08-25 17:47:12
34.92.228.170 attack
Invalid user carol from 34.92.228.170 port 58938
2020-08-25 18:08:59
200.29.105.12 attackspam
$f2bV_matches
2020-08-25 18:06:55
196.27.115.50 attackbotsspam
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-25 17:35:25

Recently Reported IPs

22.176.228.252 252.193.174.48 55.65.37.190 192.202.26.79
150.97.214.242 122.92.18.236 9.196.105.130 241.60.188.38
46.31.109.100 190.131.40.161 147.24.164.227 251.107.49.88
209.95.97.124 225.118.197.132 160.75.43.80 71.85.73.163
127.84.230.191 72.101.30.166 140.37.142.171 83.164.42.50