Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
204.194.29.4 attackspambots
IDS admin
2020-06-01 04:56:55
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 204.194.2.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54931
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;204.194.2.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:01:08 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 142.2.194.204.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 204.194.2.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
88.218.16.14 attackbots
TCP Port Scanning
2020-07-23 05:17:28
222.172.244.33 attackbotsspam
Attempted connection to port 1433.
2020-07-23 05:03:05
103.43.185.142 attackspambots
Jul 22 13:39:48 pixelmemory sshd[867985]: Invalid user ali from 103.43.185.142 port 35698
Jul 22 13:39:48 pixelmemory sshd[867985]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.43.185.142 
Jul 22 13:39:48 pixelmemory sshd[867985]: Invalid user ali from 103.43.185.142 port 35698
Jul 22 13:39:50 pixelmemory sshd[867985]: Failed password for invalid user ali from 103.43.185.142 port 35698 ssh2
Jul 22 13:42:49 pixelmemory sshd[873517]: Invalid user postgres from 103.43.185.142 port 45374
...
2020-07-23 04:53:53
182.61.2.67 attack
Jul 22 16:35:07 havingfunrightnow sshd[31253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.2.67 
Jul 22 16:35:09 havingfunrightnow sshd[31253]: Failed password for invalid user gix from 182.61.2.67 port 48798 ssh2
Jul 22 16:46:09 havingfunrightnow sshd[31593]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.2.67 
...
2020-07-23 04:54:54
80.82.64.98 attack
(pop3d) Failed POP3 login from 80.82.64.98 (NL/Netherlands/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul 23 00:46:51 ir1 dovecot[3110802]: pop3-login: Aborted login (auth failed, 1 attempts in 2 secs): user=, method=PLAIN, rip=80.82.64.98, lip=5.63.12.44, session=
2020-07-23 04:44:59
142.93.235.47 attackbots
Triggered by Fail2Ban at Ares web server
2020-07-23 04:53:28
122.246.6.120 attack
Attempted connection to port 34737.
2020-07-23 05:07:56
107.180.92.3 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-23 05:17:03
128.127.90.34 attackbotsspam
detected by Fail2Ban
2020-07-23 05:00:17
61.186.64.172 attackspambots
spam (f2b h2)
2020-07-23 04:57:42
212.129.60.77 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2020-07-23 05:11:54
173.236.148.116 attackspam
Brute forcing email accounts
2020-07-23 04:49:07
106.13.175.211 attackspambots
(sshd) Failed SSH login from 106.13.175.211 (CN/China/-): 5 in the last 3600 secs
2020-07-23 05:10:34
101.53.249.33 attack
Unauthorized connection attempt from IP address 101.53.249.33 on Port 445(SMB)
2020-07-23 05:10:51
113.180.106.102 attackspam
1595429151 - 07/22/2020 16:45:51 Host: 113.180.106.102/113.180.106.102 Port: 445 TCP Blocked
2020-07-23 05:16:33

Recently Reported IPs

225.185.74.216 200.186.163.138 199.238.79.3 246.204.167.240
132.100.99.171 223.225.40.67 98.17.99.152 58.236.171.119
152.236.179.46 117.196.249.246 164.203.211.195 21.215.78.82
190.114.144.69 5.16.125.158 106.64.167.152 235.131.15.168
238.9.134.35 154.85.14.185 20.58.28.48 125.204.182.188