Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Ireland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.208.145.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14451
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.208.145.142.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020301 1800 900 604800 86400

;; Query time: 43 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 02:07:03 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 142.145.208.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.145.208.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
164.132.73.220 attackbots
Jun  7 15:56:59 vps647732 sshd[26573]: Failed password for root from 164.132.73.220 port 42324 ssh2
...
2020-06-07 22:01:47
190.15.59.89 attack
Lines containing failures of 190.15.59.89
Jun  5 15:13:22 shared10 sshd[12026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.15.59.89  user=r.r
Jun  5 15:13:23 shared10 sshd[12026]: Failed password for r.r from 190.15.59.89 port 59476 ssh2
Jun  5 15:13:24 shared10 sshd[12026]: Received disconnect from 190.15.59.89 port 59476:11: Bye Bye [preauth]
Jun  5 15:13:24 shared10 sshd[12026]: Disconnected from authenticating user r.r 190.15.59.89 port 59476 [preauth]
Jun  5 15:29:07 shared10 sshd[18215]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.15.59.89  user=r.r
Jun  5 15:29:09 shared10 sshd[18215]: Failed password for r.r from 190.15.59.89 port 57328 ssh2
Jun  5 15:29:09 shared10 sshd[18215]: Received disconnect from 190.15.59.89 port 57328:11: Bye Bye [preauth]
Jun  5 15:29:09 shared10 sshd[18215]: Disconnected from authenticating user r.r 190.15.59.89 port 57328 [preauth]
Jun  5 ........
------------------------------
2020-06-07 21:46:50
185.129.62.62 attackbotsspam
(smtpauth) Failed SMTP AUTH login from 185.129.62.62 (DK/Denmark/tor01.zencurity.dk): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-07 16:38:21 plain authenticator failed for tor01.zencurity.dk (co7hlk50pzak0stmtfvhiybjlkd) [185.129.62.62]: 535 Incorrect authentication data (set_id=info@nazhvangiah.com)
2020-06-07 21:31:00
121.122.88.61 attack
Automatic report - Port Scan Attack
2020-06-07 22:07:05
195.54.160.180 attackspambots
...
2020-06-07 22:10:04
49.88.112.112 attackbotsspam
Jun  7 10:03:24 plusreed sshd[23060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.112  user=root
Jun  7 10:03:25 plusreed sshd[23060]: Failed password for root from 49.88.112.112 port 30164 ssh2
...
2020-06-07 22:06:15
222.186.42.155 attack
Jun  7 15:44:42 minden010 sshd[18020]: Failed password for root from 222.186.42.155 port 14643 ssh2
Jun  7 15:44:45 minden010 sshd[18020]: Failed password for root from 222.186.42.155 port 14643 ssh2
Jun  7 15:44:47 minden010 sshd[18020]: Failed password for root from 222.186.42.155 port 14643 ssh2
...
2020-06-07 21:46:30
192.42.116.15 attackbots
Jun  7 14:08:21 [Censored Hostname] sshd[16445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.15 
Jun  7 14:08:23 [Censored Hostname] sshd[16445]: Failed password for invalid user admin from 192.42.116.15 port 57722 ssh2[...]
2020-06-07 21:37:27
161.35.104.193 attackbots
24889/tcp 28780/tcp 11781/tcp...
[2020-05-11/06-06]58pkt,20pt.(tcp)
2020-06-07 21:55:57
85.93.218.204 attack
(sshd) Failed SSH login from 85.93.218.204 (LU/Luxembourg/tor.localhost.lu): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  7 14:58:43 ubnt-55d23 sshd[16979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=85.93.218.204  user=root
Jun  7 14:58:45 ubnt-55d23 sshd[16979]: Failed password for root from 85.93.218.204 port 43918 ssh2
2020-06-07 22:13:00
111.229.68.21 attack
IP 111.229.68.21 attacked honeypot on port: 6379 at 6/7/2020 1:08:00 PM
2020-06-07 21:44:12
106.51.98.159 attack
Jun  7 13:53:57 game-panel sshd[15555]: Failed password for root from 106.51.98.159 port 41824 ssh2
Jun  7 13:57:56 game-panel sshd[15723]: Failed password for root from 106.51.98.159 port 44098 ssh2
2020-06-07 22:07:21
192.42.116.26 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-06-07 22:06:32
182.72.104.106 attackspambots
Jun  7 14:04:35 melroy-server sshd[14617]: Failed password for root from 182.72.104.106 port 53206 ssh2
...
2020-06-07 21:42:51
106.12.179.236 attackspam
Jun  7 15:01:06 OPSO sshd\[12560\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.179.236  user=root
Jun  7 15:01:08 OPSO sshd\[12560\]: Failed password for root from 106.12.179.236 port 49622 ssh2
Jun  7 15:05:17 OPSO sshd\[13162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.179.236  user=root
Jun  7 15:05:20 OPSO sshd\[13162\]: Failed password for root from 106.12.179.236 port 46376 ssh2
Jun  7 15:09:25 OPSO sshd\[13845\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.179.236  user=root
2020-06-07 21:29:33

Recently Reported IPs

24.187.179.18 242.117.223.8 191.203.152.33 176.5.131.65
80.187.173.114 80.206.131.137 254.145.150.146 243.13.239.140
80.13.24.147 202.251.0.131 13.102.130.146 34.187.31.0
253.109.146.137 106.40.1.16 109.187.152.188 143.130.120.147
29.205.147.161 9.134.68.14 28.200.16.63 80.113.201.147