Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seattle

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.12.43.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60401
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;3.12.43.142.			IN	A

;; AUTHORITY SECTION:
.			2774	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051500 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed May 15 22:31:06 CST 2019
;; MSG SIZE  rcvd: 115

Host info
Host 142.43.12.3.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 142.43.12.3.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
216.218.206.120 attackspambots
firewall-block, port(s): 4786/tcp
2020-07-30 00:16:10
59.172.6.244 attackbotsspam
Unauthorised connection attempt detected at AUO NODE 4. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-29 23:44:49
88.150.241.123 attack
88.150.241.123 - - \[29/Jul/2020:05:10:28 -0700\] "HEAD /1596024628650557057 HTTP/1.1" 404 -88.150.241.123 - - \[29/Jul/2020:05:10:32 -0700\] "GET /wp-includes/wlwmanifest.xml HTTP/1.1" 404 2049588.150.241.123 - - \[29/Jul/2020:05:10:33 -0700\] "GET /wp-admin HTTP/1.1" 404 20419
...
2020-07-29 23:47:21
45.143.138.128 attackspam
Email rejected due to spam filtering
2020-07-29 23:45:57
2.234.126.30 attackbots
firewall-block, port(s): 23009/tcp
2020-07-30 00:07:23
109.227.63.3 attackspambots
2020-07-29T15:17:44.105768abusebot-2.cloudsearch.cf sshd[13812]: Invalid user betadm from 109.227.63.3 port 41152
2020-07-29T15:17:44.112464abusebot-2.cloudsearch.cf sshd[13812]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3
2020-07-29T15:17:44.105768abusebot-2.cloudsearch.cf sshd[13812]: Invalid user betadm from 109.227.63.3 port 41152
2020-07-29T15:17:46.274024abusebot-2.cloudsearch.cf sshd[13812]: Failed password for invalid user betadm from 109.227.63.3 port 41152 ssh2
2020-07-29T15:25:14.058609abusebot-2.cloudsearch.cf sshd[14128]: Invalid user liup from 109.227.63.3 port 35745
2020-07-29T15:25:14.069194abusebot-2.cloudsearch.cf sshd[14128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.227.63.3
2020-07-29T15:25:14.058609abusebot-2.cloudsearch.cf sshd[14128]: Invalid user liup from 109.227.63.3 port 35745
2020-07-29T15:25:16.341111abusebot-2.cloudsearch.cf sshd[14128]: Failed passw
...
2020-07-30 00:22:53
115.134.221.236 attackbots
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-07-29 23:56:20
80.211.137.127 attackspam
Jul 29 15:14:31 minden010 sshd[3187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.137.127
Jul 29 15:14:32 minden010 sshd[3187]: Failed password for invalid user yuanganzhao from 80.211.137.127 port 44124 ssh2
Jul 29 15:18:57 minden010 sshd[3780]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.137.127
...
2020-07-30 00:00:02
37.49.230.56 attack
[Wed Jul 29 07:50:36 2020] - Syn Flood From IP: 37.49.230.56 Port: 9509
2020-07-29 23:39:08
222.186.180.8 attack
Jul 29 18:09:53 ip106 sshd[19144]: Failed password for root from 222.186.180.8 port 43034 ssh2
Jul 29 18:09:59 ip106 sshd[19144]: Failed password for root from 222.186.180.8 port 43034 ssh2
...
2020-07-30 00:11:27
192.35.169.40 attackspam
Fail2Ban Ban Triggered
2020-07-30 00:19:22
84.54.94.10 attackbotsspam
Email rejected due to spam filtering
2020-07-29 23:56:54
140.143.228.18 attackbots
[ssh] SSH attack
2020-07-30 00:13:16
109.75.53.152 attack
Email rejected due to spam filtering
2020-07-29 23:55:26
5.76.32.8 attack
Email rejected due to spam filtering
2020-07-30 00:09:37

Recently Reported IPs

82.221.131.102 189.136.106.246 66.249.73.30 165.213.252.85
58.68.233.233 66.249.73.12 214.255.184.62 24.15.28.35
66.249.73.10 138.26.88.160 79.156.191.115 5.9.37.237
126.154.200.67 108.41.189.145 211.82.236.209 123.39.198.57
5.240.235.18 123.118.216.122 76.106.162.107 169.56.84.198