Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.219.189.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64351
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;254.219.189.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 18:38:31 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 142.189.219.254.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.189.219.254.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
87.249.45.135 attack
Invalid user yjf from 87.249.45.135 port 35700
2020-03-30 07:34:30
139.199.50.159 attackbots
SSH/22 MH Probe, BF, Hack -
2020-03-30 07:19:50
116.228.37.90 attackbots
Invalid user djc from 116.228.37.90 port 34604
2020-03-30 07:49:14
193.56.28.104 attack
Invalid user admin from 193.56.28.104 port 64329
2020-03-30 07:38:09
202.82.149.243 attack
2020-03-30T01:14:25.372852vps751288.ovh.net sshd\[22506\]: Invalid user musicbot from 202.82.149.243 port 39798
2020-03-30T01:14:25.382403vps751288.ovh.net sshd\[22506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=smtp.ifourltd.com
2020-03-30T01:14:26.714696vps751288.ovh.net sshd\[22506\]: Failed password for invalid user musicbot from 202.82.149.243 port 39798 ssh2
2020-03-30T01:16:41.992843vps751288.ovh.net sshd\[22560\]: Invalid user jenkins from 202.82.149.243 port 41716
2020-03-30T01:16:42.009475vps751288.ovh.net sshd\[22560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=smtp.ifourltd.com
2020-03-30 07:37:13
191.13.215.183 attack
Mar 30 01:09:08 ewelt sshd[6366]: Invalid user egr from 191.13.215.183 port 34870
Mar 30 01:09:08 ewelt sshd[6366]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.13.215.183
Mar 30 01:09:08 ewelt sshd[6366]: Invalid user egr from 191.13.215.183 port 34870
Mar 30 01:09:10 ewelt sshd[6366]: Failed password for invalid user egr from 191.13.215.183 port 34870 ssh2
...
2020-03-30 07:29:19
181.49.118.185 attackspambots
Invalid user dpd from 181.49.118.185 port 56258
2020-03-30 07:39:46
102.22.126.177 attack
Automatic report - Banned IP Access
2020-03-30 07:27:27
150.223.2.48 attack
Mar 29 22:54:12 IngegnereFirenze sshd[11493]: Failed password for invalid user airbot from 150.223.2.48 port 34246 ssh2
...
2020-03-30 07:30:28
106.12.48.226 attackspam
2020-03-29T22:35:35.516719abusebot-7.cloudsearch.cf sshd[27579]: Invalid user apr from 106.12.48.226 port 27802
2020-03-29T22:35:35.522522abusebot-7.cloudsearch.cf sshd[27579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.226
2020-03-29T22:35:35.516719abusebot-7.cloudsearch.cf sshd[27579]: Invalid user apr from 106.12.48.226 port 27802
2020-03-29T22:35:37.647803abusebot-7.cloudsearch.cf sshd[27579]: Failed password for invalid user apr from 106.12.48.226 port 27802 ssh2
2020-03-29T22:43:16.610287abusebot-7.cloudsearch.cf sshd[28336]: Invalid user tfm from 106.12.48.226 port 61359
2020-03-29T22:43:16.616865abusebot-7.cloudsearch.cf sshd[28336]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.48.226
2020-03-29T22:43:16.610287abusebot-7.cloudsearch.cf sshd[28336]: Invalid user tfm from 106.12.48.226 port 61359
2020-03-29T22:43:18.696800abusebot-7.cloudsearch.cf sshd[28336]: Failed password 
...
2020-03-30 07:54:20
51.132.145.250 attackspam
(sshd) Failed SSH login from 51.132.145.250 (GB/United Kingdom/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 30 00:21:52 ubnt-55d23 sshd[13430]: Invalid user vuv from 51.132.145.250 port 55502
Mar 30 00:21:55 ubnt-55d23 sshd[13430]: Failed password for invalid user vuv from 51.132.145.250 port 55502 ssh2
2020-03-30 07:34:49
113.120.33.47 attackspambots
Rude login attack (2 tries in 1d)
2020-03-30 07:14:45
97.74.236.154 attackspam
Mar 30 01:24:18 [host] sshd[9041]: Invalid user ba
Mar 30 01:24:18 [host] sshd[9041]: pam_unix(sshd:a
Mar 30 01:24:20 [host] sshd[9041]: Failed password
2020-03-30 07:33:29
106.58.210.27 attackspambots
Mar 29 23:36:13 ncomp postfix/smtpd[21710]: warning: unknown[106.58.210.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 29 23:36:22 ncomp postfix/smtpd[21710]: warning: unknown[106.58.210.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Mar 29 23:36:36 ncomp postfix/smtpd[21710]: warning: unknown[106.58.210.27]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2020-03-30 07:17:11
180.106.149.180 attack
Invalid user dke from 180.106.149.180 port 36686
2020-03-30 07:30:14

Recently Reported IPs

216.85.100.232 65.81.106.40 60.188.196.70 123.96.40.92
135.201.4.95 239.199.138.20 241.105.168.137 249.201.5.39
65.208.206.232 198.88.146.227 214.182.46.55 149.243.35.207
216.142.251.118 221.79.58.183 214.230.179.238 39.12.190.169
57.158.81.27 252.58.212.232 115.144.242.77 71.149.92.90