Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea Republic of

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 49.142.208.143
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12616
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;49.142.208.143.			IN	A

;; AUTHORITY SECTION:
.			425	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021301 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 14 08:52:56 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 143.208.142.49.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 143.208.142.49.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.106.38.97 attackspam
Port Scan
...
2020-07-26 22:13:01
218.92.0.249 attackbotsspam
Jul 26 13:58:05 rush sshd[25925]: Failed password for root from 218.92.0.249 port 21667 ssh2
Jul 26 13:58:19 rush sshd[25927]: Failed password for root from 218.92.0.249 port 41211 ssh2
Jul 26 13:58:22 rush sshd[25927]: Failed password for root from 218.92.0.249 port 41211 ssh2
...
2020-07-26 22:21:28
177.72.56.42 attack
20/7/26@08:06:22: FAIL: Alarm-Network address from=177.72.56.42
20/7/26@08:06:22: FAIL: Alarm-Network address from=177.72.56.42
...
2020-07-26 21:54:24
125.137.191.215 attack
Jul 26 14:06:35 ajax sshd[12061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.137.191.215 
Jul 26 14:06:37 ajax sshd[12061]: Failed password for invalid user mom from 125.137.191.215 port 916 ssh2
2020-07-26 21:58:48
200.129.244.1 attackspam
Icarus honeypot on github
2020-07-26 21:57:54
218.92.0.200 attackbotsspam
Jul 26 16:14:40 pve1 sshd[22018]: Failed password for root from 218.92.0.200 port 23655 ssh2
Jul 26 16:14:44 pve1 sshd[22018]: Failed password for root from 218.92.0.200 port 23655 ssh2
...
2020-07-26 22:34:22
91.93.2.147 attackbotsspam
[Sun Jul 26 13:06:00.290881 2020] [authz_core:error] [pid 9279] [client 91.93.2.147:36988] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/phpmyadmin
[Sun Jul 26 13:06:00.517391 2020] [authz_core:error] [pid 9147] [client 91.93.2.147:37032] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/phpMyadmin
[Sun Jul 26 13:06:00.738271 2020] [authz_core:error] [pid 7839] [client 91.93.2.147:37068] AH01630: client denied by server configuration: /srv/www/vhosts/rncbc/phpMyAdmin
...
2020-07-26 22:20:35
186.225.80.194 attackbots
2020-07-26T13:15:46.489022vps1033 sshd[5325]: Invalid user administrator from 186.225.80.194 port 41401
2020-07-26T13:15:46.492782vps1033 sshd[5325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.225.80.194
2020-07-26T13:15:46.489022vps1033 sshd[5325]: Invalid user administrator from 186.225.80.194 port 41401
2020-07-26T13:15:48.375138vps1033 sshd[5325]: Failed password for invalid user administrator from 186.225.80.194 port 41401 ssh2
2020-07-26T13:20:38.074531vps1033 sshd[15645]: Invalid user sinusbot from 186.225.80.194 port 44608
...
2020-07-26 22:07:28
120.237.118.144 attackspam
SSH bruteforce
2020-07-26 22:11:21
122.15.137.106 attack
Unauthorized SSH login attempts
2020-07-26 22:09:27
186.59.241.242 attack
Jul 26 10:28:50 firewall sshd[6543]: Invalid user apache from 186.59.241.242
Jul 26 10:28:52 firewall sshd[6543]: Failed password for invalid user apache from 186.59.241.242 port 41633 ssh2
Jul 26 10:33:54 firewall sshd[6641]: Invalid user 123 from 186.59.241.242
...
2020-07-26 22:10:56
79.178.60.203 attackbotsspam
TCP Port Scanning
2020-07-26 22:01:58
134.122.103.0 attackbotsspam
134.122.103.0 - - \[26/Jul/2020:14:58:41 +0200\] "POST /wp-login.php HTTP/1.0" 200 4128 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
134.122.103.0 - - \[26/Jul/2020:14:58:48 +0200\] "POST /wp-login.php HTTP/1.0" 200 3955 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
134.122.103.0 - - \[26/Jul/2020:14:58:58 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-07-26 22:16:35
222.186.52.39 attackspam
SSH Bruteforce Attempt on Honeypot
2020-07-26 22:25:01
111.47.89.157 attack
Port Scan
...
2020-07-26 22:10:22

Recently Reported IPs

49.142.208.72 49.142.208.200 49.143.120.62 49.144.132.82
49.144.206.90 49.145.174.97 49.145.227.60 49.146.201.236
49.146.18.13 49.145.73.118 49.145.101.67 49.146.35.124
49.146.37.109 49.146.255.24 49.146.40.24 49.146.40.14
49.146.34.0 49.146.41.156 49.146.37.89 49.146.47.80