Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Puerto Rico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 67.142.180.158
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18115
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;67.142.180.158.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 13:17:51 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 158.180.142.67.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 67.142.180.158.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
99.132.140.63 attackspambots
2020-04-09T12:02:06.834281librenms sshd[13821]: Invalid user deploy from 99.132.140.63 port 44990
2020-04-09T12:02:08.922021librenms sshd[13821]: Failed password for invalid user deploy from 99.132.140.63 port 44990 ssh2
2020-04-09T12:05:42.748377librenms sshd[14452]: Invalid user docker from 99.132.140.63 port 55744
...
2020-04-09 19:35:46
185.185.26.215 attack
2020-04-09T04:58:46.440497linuxbox-skyline sshd[42353]: Invalid user sysadmin from 185.185.26.215 port 34528
...
2020-04-09 19:42:15
115.159.46.47 attackspam
Apr  9 11:17:28 minden010 sshd[11685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.46.47
Apr  9 11:17:30 minden010 sshd[11685]: Failed password for invalid user grid from 115.159.46.47 port 54452 ssh2
Apr  9 11:22:21 minden010 sshd[14327]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.159.46.47
...
2020-04-09 19:14:14
51.38.186.180 attack
Apr  9 13:53:06 markkoudstaal sshd[11646]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180
Apr  9 13:53:08 markkoudstaal sshd[11646]: Failed password for invalid user tom from 51.38.186.180 port 48524 ssh2
Apr  9 13:56:59 markkoudstaal sshd[12153]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.186.180
2020-04-09 19:57:12
185.132.228.118 attackbotsspam
Brute force attempt
2020-04-09 19:40:28
177.30.47.9 attackspam
Apr  9 11:15:53 localhost sshd\[12651\]: Invalid user test from 177.30.47.9 port 45374
Apr  9 11:15:53 localhost sshd\[12651\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.30.47.9
Apr  9 11:15:55 localhost sshd\[12651\]: Failed password for invalid user test from 177.30.47.9 port 45374 ssh2
...
2020-04-09 19:23:45
142.44.251.207 attack
(sshd) Failed SSH login from 142.44.251.207 (CA/Canada/ip207.ip-142-44-251.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  9 13:21:44 srv sshd[31465]: Invalid user ubuntu from 142.44.251.207 port 49263
Apr  9 13:21:46 srv sshd[31465]: Failed password for invalid user ubuntu from 142.44.251.207 port 49263 ssh2
Apr  9 13:33:37 srv sshd[356]: Invalid user administrator from 142.44.251.207 port 36139
Apr  9 13:33:39 srv sshd[356]: Failed password for invalid user administrator from 142.44.251.207 port 36139 ssh2
Apr  9 13:37:59 srv sshd[842]: Invalid user ubuntu from 142.44.251.207 port 41300
2020-04-09 19:31:35
118.89.61.51 attackbotsspam
Apr  9 09:59:59 server sshd\[23166\]: Invalid user test from 118.89.61.51
Apr  9 09:59:59 server sshd\[23166\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.61.51 
Apr  9 10:00:01 server sshd\[23166\]: Failed password for invalid user test from 118.89.61.51 port 44046 ssh2
Apr  9 10:08:52 server sshd\[25446\]: Invalid user oracle from 118.89.61.51
Apr  9 10:08:52 server sshd\[25446\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.89.61.51 
...
2020-04-09 19:17:47
213.110.12.191 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-04-09 19:33:43
198.98.60.164 attackspam
Apr  9 07:31:10 ncomp sshd[2702]: Invalid user admin from 198.98.60.164
Apr  9 07:31:10 ncomp sshd[2702]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.98.60.164
Apr  9 07:31:10 ncomp sshd[2702]: Invalid user admin from 198.98.60.164
Apr  9 07:31:12 ncomp sshd[2702]: Failed password for invalid user admin from 198.98.60.164 port 55395 ssh2
2020-04-09 19:15:15
49.235.39.217 attackbots
Apr  9 13:46:22 [host] sshd[8092]: Invalid user ds
Apr  9 13:46:22 [host] sshd[8092]: pam_unix(sshd:a
Apr  9 13:46:24 [host] sshd[8092]: Failed password
2020-04-09 20:02:01
118.24.33.38 attackspambots
$lgm
2020-04-09 20:00:37
222.186.175.182 attackbots
Apr  9 16:22:14 gw1 sshd[18987]: Failed password for root from 222.186.175.182 port 52666 ssh2
Apr  9 16:22:27 gw1 sshd[18987]: error: maximum authentication attempts exceeded for root from 222.186.175.182 port 52666 ssh2 [preauth]
...
2020-04-09 19:23:13
139.199.0.84 attackspam
Apr  9 03:14:59 s158375 sshd[1113]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.0.84
2020-04-09 20:01:33
193.252.189.177 attackbots
Bruteforce detected by fail2ban
2020-04-09 19:18:53

Recently Reported IPs

100.244.58.121 14.144.61.161 223.112.130.65 133.252.233.146
114.192.77.150 49.1.163.125 248.233.88.227 16.103.160.27
153.135.109.36 159.30.87.36 40.206.109.34 18.234.103.22
214.132.189.145 173.219.198.31 173.0.34.57 51.40.44.71
57.14.140.51 214.194.120.138 246.246.240.90 81.109.24.137