Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Maria

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Frontier Communications of America, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.142.204.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64002
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;47.142.204.13.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 28 03:47:10 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 13.204.142.47.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 13.204.142.47.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
180.76.108.73 attackbots
Invalid user teamspeak from 180.76.108.73 port 54850
2020-08-20 15:37:56
91.247.58.242 attack
Email rejected due to spam filtering
2020-08-20 16:00:32
164.68.119.127 attack
Invalid user labs from 164.68.119.127 port 50813
2020-08-20 16:05:19
145.239.1.182 attack
2020-08-20T03:50:56.426180server.espacesoutien.com sshd[29692]: Failed password for root from 145.239.1.182 port 49454 ssh2
2020-08-20T03:50:58.855487server.espacesoutien.com sshd[29692]: Failed password for root from 145.239.1.182 port 49454 ssh2
2020-08-20T03:51:01.723286server.espacesoutien.com sshd[29692]: Failed password for root from 145.239.1.182 port 49454 ssh2
2020-08-20T03:51:04.105182server.espacesoutien.com sshd[29692]: Failed password for root from 145.239.1.182 port 49454 ssh2
...
2020-08-20 16:18:03
185.50.25.49 attack
Automatic report - Banned IP Access
2020-08-20 16:17:34
20.188.32.219 attack
Aug 20 08:49:53 saturn sshd[870538]: Failed password for invalid user plex from 20.188.32.219 port 46210 ssh2
Aug 20 09:04:24 saturn sshd[871119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=20.188.32.219  user=root
Aug 20 09:04:26 saturn sshd[871119]: Failed password for root from 20.188.32.219 port 35274 ssh2
...
2020-08-20 15:39:12
218.92.0.185 attack
Brute-force attempt banned
2020-08-20 15:43:29
42.113.205.66 attack
20/8/19@23:51:18: FAIL: Alarm-Network address from=42.113.205.66
20/8/19@23:51:18: FAIL: Alarm-Network address from=42.113.205.66
...
2020-08-20 16:09:20
140.207.96.235 attackspambots
Aug 20 09:50:15 ip40 sshd[16778]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.207.96.235 
Aug 20 09:50:17 ip40 sshd[16778]: Failed password for invalid user ftpadmin from 140.207.96.235 port 37180 ssh2
...
2020-08-20 15:52:20
115.159.190.174 attackbotsspam
2020-08-20T04:58:42+0000 Failed SSH Authentication/Brute Force Attack. (Server 6)
2020-08-20 16:03:03
85.175.99.105 attackspambots
Dovecot Invalid User Login Attempt.
2020-08-20 15:47:31
120.132.6.27 attack
Invalid user kys from 120.132.6.27 port 40019
2020-08-20 16:14:22
62.112.11.88 attackbotsspam
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-08-20T03:42:54Z and 2020-08-20T04:10:58Z
2020-08-20 15:38:15
110.39.7.4 attack
Invalid user testuser from 110.39.7.4 port 45714
2020-08-20 16:09:00
114.33.227.50 attackbots
" "
2020-08-20 15:47:17

Recently Reported IPs

104.202.30.233 5.180.78.139 141.42.16.85 134.209.154.168
219.124.252.197 120.131.108.53 164.140.169.73 132.248.254.246
80.2.99.28 63.147.237.187 188.210.63.75 78.157.168.224
223.253.5.47 126.117.69.142 201.165.192.95 125.160.64.144
121.23.86.123 195.140.50.186 3.95.200.206 114.192.21.30