Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 23.10.142.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44015
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;23.10.142.64.			IN	A

;; AUTHORITY SECTION:
.			479	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021801 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 19 02:22:09 CST 2022
;; MSG SIZE  rcvd: 105
Host info
64.142.10.23.in-addr.arpa domain name pointer a23-10-142-64.deploy.static.akamaitechnologies.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
64.142.10.23.in-addr.arpa	name = a23-10-142-64.deploy.static.akamaitechnologies.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.167.225.81 attack
Oct 28 08:29:04 plusreed sshd[29418]: Invalid user va from 95.167.225.81
...
2019-10-28 20:39:10
222.186.173.215 attackspam
Oct 28 14:02:40 arianus sshd\[28832\]: Unable to negotiate with 222.186.173.215 port 7172: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 \[preauth\]
...
2019-10-28 21:06:11
66.249.66.145 attack
Automatic report - Banned IP Access
2019-10-28 20:55:27
222.186.52.86 attackspambots
Oct 28 08:51:40 ny01 sshd[627]: Failed password for root from 222.186.52.86 port 12151 ssh2
Oct 28 08:54:36 ny01 sshd[875]: Failed password for root from 222.186.52.86 port 26413 ssh2
Oct 28 08:54:39 ny01 sshd[875]: Failed password for root from 222.186.52.86 port 26413 ssh2
2019-10-28 21:10:06
99.86.230.83 attackspam
spam redirect https://www.youse.com.br/auto/order/new?utm_source=awin&utm_medium=affiliate&utm_content=cpl&utm_campaign=email&utm_term=2174876|httpwwwmail2clickcombr&zanpid=2623867213262167040
https://www.youse.com.br/auto/order/f2e97251-3ad2-402c-8370-e26bfc8ec5ea?utm_campaign=email&utm_content=cpl&utm_medium=affiliate&utm_source=awin&utm_term=2174876%7Chttpwwwmail2clickcombr
2019-10-28 21:07:09
176.236.59.59 attack
Spoofed email, "I have your password"
2019-10-28 21:13:13
46.101.105.55 attack
Oct 28 13:44:58 vps01 sshd[18535]: Failed password for root from 46.101.105.55 port 40554 ssh2
Oct 28 13:48:36 vps01 sshd[18612]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.105.55
2019-10-28 20:51:58
222.186.175.202 attackbots
Oct 28 14:11:12 vpn01 sshd[931]: Failed password for root from 222.186.175.202 port 52216 ssh2
Oct 28 14:11:25 vpn01 sshd[931]: Failed password for root from 222.186.175.202 port 52216 ssh2
...
2019-10-28 21:16:25
185.176.27.242 attack
Oct 28 13:27:21 mc1 kernel: \[3551970.907263\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.242 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=14983 PROTO=TCP SPT=47834 DPT=50633 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 28 13:32:46 mc1 kernel: \[3552296.077749\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.242 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=27270 PROTO=TCP SPT=47834 DPT=51715 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 28 13:37:16 mc1 kernel: \[3552565.863852\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.242 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=45478 PROTO=TCP SPT=47834 DPT=41567 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-28 20:48:40
118.174.45.29 attackspambots
Oct 28 03:08:10 kapalua sshd\[5970\]: Invalid user 123456 from 118.174.45.29
Oct 28 03:08:10 kapalua sshd\[5970\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29
Oct 28 03:08:12 kapalua sshd\[5970\]: Failed password for invalid user 123456 from 118.174.45.29 port 43478 ssh2
Oct 28 03:12:58 kapalua sshd\[6557\]: Invalid user 1234 from 118.174.45.29
Oct 28 03:12:58 kapalua sshd\[6557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.174.45.29
2019-10-28 21:17:48
182.176.169.146 attack
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-28 20:49:45
118.25.150.90 attack
2019-10-28T12:48:09.3910521240 sshd\[31639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.150.90  user=root
2019-10-28T12:48:11.3797331240 sshd\[31639\]: Failed password for root from 118.25.150.90 port 59833 ssh2
2019-10-28T12:53:41.3413581240 sshd\[31872\]: Invalid user webadmin from 118.25.150.90 port 50534
2019-10-28T12:53:41.3440791240 sshd\[31872\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.150.90
...
2019-10-28 20:41:06
217.68.222.76 attack
slow and persistent scanner
2019-10-28 20:52:30
45.224.126.168 attackbotsspam
Oct 28 13:24:53 ns381471 sshd[19929]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.224.126.168
Oct 28 13:24:55 ns381471 sshd[19929]: Failed password for invalid user 1qaz2wsx from 45.224.126.168 port 49707 ssh2
2019-10-28 20:49:24
119.29.62.104 attack
Oct 28 13:49:19 mout sshd[15333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.62.104  user=root
Oct 28 13:49:21 mout sshd[15333]: Failed password for root from 119.29.62.104 port 37076 ssh2
2019-10-28 20:53:10

Recently Reported IPs

23.10.141.53 23.10.141.170 23.10.142.145 23.10.142.80
23.10.141.35 23.10.143.188 23.10.143.105 23.10.141.4
23.10.143.137 23.10.143.104 23.10.142.79 23.10.143.98
23.10.143.228 23.10.2.71 23.10.252.129 23.10.86.211
23.10.143.64 23.100.1.129 23.10.92.245 23.10.88.237