Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Multicast Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 234.108.220.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47632
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;234.108.220.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 19:55:30 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 142.220.108.234.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.220.108.234.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
196.34.18.193 attackbots
Jul 19 16:48:21 onepixel sshd[962336]: Invalid user mp from 196.34.18.193 port 60102
Jul 19 16:48:21 onepixel sshd[962336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.34.18.193 
Jul 19 16:48:21 onepixel sshd[962336]: Invalid user mp from 196.34.18.193 port 60102
Jul 19 16:48:23 onepixel sshd[962336]: Failed password for invalid user mp from 196.34.18.193 port 60102 ssh2
Jul 19 16:52:47 onepixel sshd[964559]: Invalid user zf from 196.34.18.193 port 57674
2020-07-20 01:12:07
185.176.27.242 attackbots
07/19/2020-12:08:55.230516 185.176.27.242 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-07-20 00:53:54
177.91.119.252 attackbots
Jul 19 17:59:57 xeon sshd[33356]: Failed password for mysql from 177.91.119.252 port 40858 ssh2
2020-07-20 00:47:24
92.255.254.115 attackbotsspam
Automatic report - Port Scan Attack
2020-07-20 01:20:10
104.145.220.178 attackspam
Jul 19 18:02:05 www sshd[8959]: Invalid user admin from 104.145.220.178
Jul 19 18:02:05 www sshd[8959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.145.220.178 
Jul 19 18:02:07 www sshd[8959]: Failed password for invalid user admin from 104.145.220.178 port 50366 ssh2
Jul 19 18:02:07 www sshd[8959]: Received disconnect from 104.145.220.178: 11: Bye Bye [preauth]
Jul 19 18:02:08 www sshd[8961]: Invalid user admin from 104.145.220.178
Jul 19 18:02:08 www sshd[8961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.145.220.178 


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.145.220.178
2020-07-20 00:56:34
154.127.89.100 attack
xmlrpc attack
2020-07-20 01:05:37
37.152.177.25 attack
07/19/2020-12:43:44.508695 37.152.177.25 Protocol: 6 ET SCAN Potential SSH Scan
2020-07-20 00:44:43
138.255.0.27 attackbots
Jul 19 18:40:15 [host] sshd[3899]: Invalid user jo
Jul 19 18:40:15 [host] sshd[3899]: pam_unix(sshd:a
Jul 19 18:40:18 [host] sshd[3899]: Failed password
2020-07-20 01:08:53
49.235.153.220 attack
Jul 19 18:00:43 server sshd[10295]: Failed password for invalid user xtra from 49.235.153.220 port 59218 ssh2
Jul 19 18:04:41 server sshd[13268]: Failed password for invalid user admin from 49.235.153.220 port 44956 ssh2
Jul 19 18:08:45 server sshd[16364]: Failed password for invalid user xxt from 49.235.153.220 port 58934 ssh2
2020-07-20 01:04:01
185.22.142.197 attack
Jul 19 18:58:23 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=185.22.142.197, lip=176.9.177.164, session=\
Jul 19 18:58:25 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=185.22.142.197, lip=176.9.177.164, session=\
Jul 19 18:58:48 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=185.22.142.197, lip=176.9.177.164, session=\
Jul 19 19:03:59 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180 secs\): user=\, method=PLAIN, rip=185.22.142.197, lip=176.9.177.164, session=\
Jul 19 19:04:01 relay dovecot: imap-login: Disconnected: Inactivity \(auth failed, 1 attempts in 180
...
2020-07-20 01:22:12
222.186.173.183 attackspambots
Jul 19 18:30:45 ovpn sshd\[23273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
Jul 19 18:30:46 ovpn sshd\[23273\]: Failed password for root from 222.186.173.183 port 61234 ssh2
Jul 19 18:30:56 ovpn sshd\[23273\]: Failed password for root from 222.186.173.183 port 61234 ssh2
Jul 19 18:30:59 ovpn sshd\[23273\]: Failed password for root from 222.186.173.183 port 61234 ssh2
Jul 19 18:31:03 ovpn sshd\[23350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.183  user=root
2020-07-20 00:46:27
13.70.199.80 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-20 00:55:44
97.74.236.154 attackspam
Jul 19 17:33:24 rocket sshd[14455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=97.74.236.154
Jul 19 17:33:26 rocket sshd[14455]: Failed password for invalid user yoshiaki from 97.74.236.154 port 33158 ssh2
...
2020-07-20 00:51:54
2.38.186.191 attackspam
Automatic report - Banned IP Access
2020-07-20 01:07:56
118.70.180.174 attackspam
Jul 19 18:56:24 eventyay sshd[16973]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.180.174
Jul 19 18:56:26 eventyay sshd[16973]: Failed password for invalid user kevin from 118.70.180.174 port 60505 ssh2
Jul 19 19:04:27 eventyay sshd[17194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.70.180.174
...
2020-07-20 01:18:23

Recently Reported IPs

24.21.130.234 215.151.56.108 206.250.88.59 56.82.139.154
177.238.29.169 193.254.129.26 231.32.34.193 68.246.45.74
114.227.86.8 154.197.248.170 140.179.240.5 177.3.65.78
187.56.177.52 195.119.139.153 206.44.13.85 232.152.250.238
78.179.64.14 81.246.181.118 151.145.146.24 18.40.24.128