Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mauritius

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 41.166.245.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49345
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;41.166.245.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 00:03:37 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 142.245.166.41.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.245.166.41.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
200.73.128.90 attack
$f2bV_matches
2020-09-06 04:18:28
14.171.48.241 attackbots
Brute forcing RDP port 3389
2020-09-06 04:18:05
211.170.28.252 attack
 TCP (SYN) 211.170.28.252:59567 -> port 4761, len 44
2020-09-06 04:12:04
102.130.122.21 attack
15 attempts against mh-mag-login-ban on lake
2020-09-06 04:09:19
189.254.169.18 attack
Unauthorized connection attempt from IP address 189.254.169.18 on Port 445(SMB)
2020-09-06 03:58:35
34.75.125.212 attackbots
Sep  5 21:48:05 haigwepa sshd[8886]: Failed password for root from 34.75.125.212 port 60532 ssh2
...
2020-09-06 04:02:28
92.39.62.17 attackspam
$f2bV_matches
2020-09-06 04:10:39
197.188.203.65 attack
Sep  4 18:45:23 mellenthin postfix/smtpd[32144]: NOQUEUE: reject: RCPT from unknown[197.188.203.65]: 554 5.7.1 Service unavailable; Client host [197.188.203.65] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/197.188.203.65; from= to= proto=ESMTP helo=<[197.188.203.65]>
2020-09-06 03:51:58
54.37.14.3 attack
2020-09-05T21:13:32.645243n23.at sshd[2977910]: Failed password for root from 54.37.14.3 port 46322 ssh2
2020-09-05T21:17:51.673767n23.at sshd[2981432]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.14.3  user=root
2020-09-05T21:17:53.842876n23.at sshd[2981432]: Failed password for root from 54.37.14.3 port 51272 ssh2
...
2020-09-06 04:17:34
1.7.161.234 attackspam
Wordpress attack
2020-09-06 04:08:47
203.55.21.198 attack
TCP Port: 25     invalid blocked  Listed on   dnsbl-sorbs also spam-sorbs and NoSolicitado           (163)
2020-09-06 03:50:54
85.242.94.53 attackbotsspam
Sep  4 18:45:26 mellenthin postfix/smtpd[32153]: NOQUEUE: reject: RCPT from bl9-94-53.dsl.telepac.pt[85.242.94.53]: 554 5.7.1 Service unavailable; Client host [85.242.94.53] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/85.242.94.53; from= to= proto=ESMTP helo=
2020-09-06 03:51:06
1.6.32.35 attackspambots
Unauthorized connection attempt from IP address 1.6.32.35 on Port 445(SMB)
2020-09-06 03:57:51
191.238.220.118 attackbots
Invalid user test2 from 191.238.220.118 port 52632
2020-09-06 04:12:21
220.246.155.136 attack
$f2bV_matches
2020-09-06 04:00:10

Recently Reported IPs

31.65.172.8 80.132.217.42 64.86.23.27 172.187.56.242
68.207.223.227 175.77.32.222 186.247.126.67 166.231.229.130
177.183.217.52 241.14.96.1 144.102.145.98 24.39.95.115
171.162.209.243 234.242.223.195 128.50.71.60 123.171.93.65
198.51.155.112 195.196.59.133 84.88.112.234 118.97.244.176