Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 217.192.71.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57966
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;217.192.71.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012100 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 21 20:41:26 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 142.71.192.217.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 217.192.71.142.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
107.170.227.141 attackspambots
'Fail2Ban'
2019-10-04 01:42:52
212.156.210.223 attack
Oct  3 09:13:37 ny01 sshd[12702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.210.223
Oct  3 09:13:39 ny01 sshd[12702]: Failed password for invalid user openhab from 212.156.210.223 port 55538 ssh2
Oct  3 09:18:12 ny01 sshd[13492]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.156.210.223
2019-10-04 02:12:40
115.84.92.29 attackspambots
Automatic report - Banned IP Access
2019-10-04 01:56:08
13.93.71.38 attackbotsspam
Automated reporting of SSH Vulnerability scanning
2019-10-04 01:53:34
168.181.120.48 attack
Automatic report - Port Scan Attack
2019-10-04 01:48:58
50.237.99.218 attackbots
Automatic report - SSH Brute-Force Attack
2019-10-04 01:33:02
140.143.72.21 attackspam
Oct  3 16:03:28 andromeda sshd\[17657\]: Invalid user tom from 140.143.72.21 port 57678
Oct  3 16:03:28 andromeda sshd\[17657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.72.21
Oct  3 16:03:30 andromeda sshd\[17657\]: Failed password for invalid user tom from 140.143.72.21 port 57678 ssh2
2019-10-04 01:49:31
190.111.118.115 attack
Input Traffic from this IP, but critial abuseconfidencescore
2019-10-04 02:08:45
46.166.151.47 attackbots
\[2019-10-03 13:35:01\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T13:35:01.426-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="0004146462607509",SessionID="0x7f1e1c02d9c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/51454",ACLName="no_extension_match"
\[2019-10-03 13:37:15\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T13:37:15.013-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00146462607509",SessionID="0x7f1e1c02d9c8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/61031",ACLName="no_extension_match"
\[2019-10-03 13:39:32\] SECURITY\[2006\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-10-03T13:39:32.797-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="00246462607509",SessionID="0x7f1e1c2f44f8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/46.166.151.47/61599",ACLName="no_exte
2019-10-04 01:41:18
117.200.165.123 attack
Unauthorised access (Oct  3) SRC=117.200.165.123 LEN=52 PREC=0x20 TTL=111 ID=12540 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-04 01:54:26
136.52.125.162 attackspam
Automated reporting of SSH Vulnerability scanning
2019-10-04 01:47:04
186.250.232.116 attack
Oct  3 19:43:30 MK-Soft-VM5 sshd[18857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.250.232.116 
Oct  3 19:43:33 MK-Soft-VM5 sshd[18857]: Failed password for invalid user vyatta from 186.250.232.116 port 58060 ssh2
...
2019-10-04 01:55:45
82.98.142.9 attack
Oct  3 02:15:35 friendsofhawaii sshd\[15726\]: Invalid user tony from 82.98.142.9
Oct  3 02:15:35 friendsofhawaii sshd\[15726\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vls15588.dinaserver.com
Oct  3 02:15:37 friendsofhawaii sshd\[15726\]: Failed password for invalid user tony from 82.98.142.9 port 60497 ssh2
Oct  3 02:24:11 friendsofhawaii sshd\[16444\]: Invalid user admin2 from 82.98.142.9
Oct  3 02:24:11 friendsofhawaii sshd\[16444\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vls15588.dinaserver.com
2019-10-04 01:51:00
103.7.29.12 attack
ICMP MP Probe, Scan -
2019-10-04 01:47:37
103.255.188.131 attackbotsspam
ICMP MP Probe, Scan -
2019-10-04 01:59:55

Recently Reported IPs

96.247.83.250 104.175.85.213 45.249.202.129 200.118.236.246
20.34.230.6 225.106.231.231 250.144.115.15 98.6.171.178
235.130.174.113 116.27.199.213 55.169.19.243 142.213.23.69
30.239.105.97 7.31.96.117 234.237.231.173 36.19.70.218
211.152.141.56 140.81.240.184 8.41.159.232 177.170.185.151