Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.78.209.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22208
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.78.209.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 21:07:28 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 142.209.78.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.209.78.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
175.145.232.73 attackbots
(sshd) Failed SSH login from 175.145.232.73 (MY/Malaysia/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 22 16:31:56 ubnt-55d23 sshd[7895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.145.232.73  user=root
Apr 22 16:31:58 ubnt-55d23 sshd[7895]: Failed password for root from 175.145.232.73 port 40446 ssh2
2020-04-23 02:23:39
80.82.64.219 attack
3389/tcp 3389/tcp 3389/tcp...
[2020-02-26/04-22]9pkt,1pt.(tcp)
2020-04-23 02:29:22
45.9.148.220 attack
45.9.148.220 - - [22/Apr/2020:11:01:35 +0000] "GET /shell.php HTTP/1.1" 404 207 "-" "Opera/9.80 (Windows NT 5.1; U; en) Presto/2.10.289 Version/12.01"
2020-04-23 02:45:15
203.134.210.136 attackspam
Invalid user tit0nich from 203.134.210.136 port 13196
2020-04-23 02:31:43
183.88.10.20 attackbots
Apr 22 11:39:59 XXX sshd[2916]: Invalid user user from 183.88.10.20 port 61411
2020-04-23 02:16:37
79.100.67.238 attackbotsspam
IP blocked
2020-04-23 02:17:35
89.42.252.124 attackbotsspam
2020-04-22T20:20:58.986239  sshd[17684]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.42.252.124  user=root
2020-04-22T20:21:01.010189  sshd[17684]: Failed password for root from 89.42.252.124 port 1787 ssh2
2020-04-22T20:27:16.341856  sshd[17732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.42.252.124  user=root
2020-04-22T20:27:18.927446  sshd[17732]: Failed password for root from 89.42.252.124 port 21012 ssh2
...
2020-04-23 02:29:01
123.140.114.196 attackbotsspam
Apr 22 23:28:38 gw1 sshd[8238]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.140.114.196
Apr 22 23:28:40 gw1 sshd[8238]: Failed password for invalid user bz from 123.140.114.196 port 36138 ssh2
...
2020-04-23 02:36:14
111.251.239.41 attackspambots
Unauthorized connection attempt from IP address 111.251.239.41 on Port 445(SMB)
2020-04-23 02:09:43
122.237.159.10 attackbots
SMTP nagging
2020-04-23 02:40:12
205.185.124.153 attackspambots
Invalid user fake from 205.185.124.153 port 46030
2020-04-23 02:30:49
208.253.27.66 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-04-23 02:41:53
102.132.227.75 attackbotsspam
DATE:2020-04-22 14:00:08, IP:102.132.227.75, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-04-23 02:14:04
185.46.16.239 attackbots
Apr 22 07:59:09 bilbo sshd[5388]: Invalid user chef from 185.46.16.239
Apr 22 07:59:26 bilbo sshd[5390]: Invalid user albin from 185.46.16.239
Apr 22 07:59:45 bilbo sshd[5392]: Invalid user aurelien from 185.46.16.239
Apr 22 08:00:02 bilbo sshd[5394]: Invalid user baptiste from 185.46.16.239
...
2020-04-23 02:26:39
201.184.117.114 attack
Invalid user sniffer from 201.184.117.114 port 55213
2020-04-23 02:33:11

Recently Reported IPs

35.4.245.16 54.122.26.43 152.28.53.161 243.232.15.60
157.68.45.28 93.41.47.82 81.12.222.168 123.220.173.7
18.13.247.221 94.51.147.80 85.170.51.152 159.3.5.113
222.222.190.184 28.133.93.86 25.133.162.79 34.159.195.165
139.185.5.250 243.69.223.176 87.19.94.148 61.132.65.196