Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jersey City

Region: New Jersey

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.142.145.19
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37040
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;69.142.145.19.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020042101 1800 900 604800 86400

;; Query time: 248 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 06:49:52 CST 2020
;; MSG SIZE  rcvd: 117
Host info
19.145.142.69.in-addr.arpa domain name pointer c-69-142-145-19.hsd1.nj.comcast.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
19.145.142.69.in-addr.arpa	name = c-69-142-145-19.hsd1.nj.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.31.249.107 attack
Automatic report - Banned IP Access
2019-11-09 21:59:14
112.29.140.225 attack
8088/tcp 7002/tcp 6379/tcp...
[2019-09-17/11-09]80pkt,9pt.(tcp)
2019-11-09 21:20:35
35.201.243.170 attackbotsspam
Repeated brute force against a port
2019-11-09 21:28:30
160.153.154.137 attack
xmlrpc attack
2019-11-09 21:24:52
167.71.210.149 attackbots
Nov  9 14:19:12 bouncer sshd\[12962\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.149  user=root
Nov  9 14:19:14 bouncer sshd\[12962\]: Failed password for root from 167.71.210.149 port 52884 ssh2
Nov  9 14:23:13 bouncer sshd\[12968\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.210.149  user=root
...
2019-11-09 21:36:24
106.12.178.82 attackspambots
Nov  9 08:01:16 meumeu sshd[28820]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.82 
Nov  9 08:01:18 meumeu sshd[28820]: Failed password for invalid user Grande123 from 106.12.178.82 port 44792 ssh2
Nov  9 08:06:21 meumeu sshd[29417]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.178.82 
...
2019-11-09 21:29:10
45.80.65.82 attackbots
Nov  9 14:12:53 meumeu sshd[12844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82 
Nov  9 14:12:55 meumeu sshd[12844]: Failed password for invalid user daniel from 45.80.65.82 port 43164 ssh2
Nov  9 14:19:02 meumeu sshd[13652]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82 
...
2019-11-09 21:44:59
125.25.208.28 attackbots
Unauthorised access (Nov  9) SRC=125.25.208.28 LEN=52 TTL=113 ID=30883 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-09 21:52:06
81.171.3.211 attackspambots
Automatic report - XMLRPC Attack
2019-11-09 21:43:26
81.183.253.86 attackbots
Nov  9 08:31:15 meumeu sshd[32331]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.253.86 
Nov  9 08:31:17 meumeu sshd[32331]: Failed password for invalid user fUWUqI@ from 81.183.253.86 port 53924 ssh2
Nov  9 08:36:05 meumeu sshd[416]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.183.253.86 
...
2019-11-09 22:01:06
36.235.7.202 attackbots
firewall-block, port(s): 23/tcp
2019-11-09 21:20:52
60.246.99.61 attackspam
Nov  9 03:42:21 web1 sshd\[19002\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.246.99.61  user=root
Nov  9 03:42:23 web1 sshd\[19002\]: Failed password for root from 60.246.99.61 port 53050 ssh2
Nov  9 03:46:24 web1 sshd\[19355\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.246.99.61  user=root
Nov  9 03:46:25 web1 sshd\[19355\]: Failed password for root from 60.246.99.61 port 34634 ssh2
Nov  9 03:50:32 web1 sshd\[19716\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.246.99.61  user=root
2019-11-09 21:56:01
210.117.132.56 attackbotsspam
SSH Bruteforce attempt
2019-11-09 21:51:31
45.136.108.67 attack
Connection by 45.136.108.67 on port: 5909 got caught by honeypot at 11/9/2019 8:49:15 AM
2019-11-09 22:00:28
191.236.21.165 attack
Automatic report - XMLRPC Attack
2019-11-09 21:39:44

Recently Reported IPs

187.103.161.207 97.79.155.169 162.104.183.116 85.30.112.0
88.236.246.128 209.203.88.201 108.216.201.27 84.141.181.53
205.208.16.193 32.22.140.7 91.26.207.16 95.122.136.173
222.132.225.146 112.93.59.246 52.104.49.180 78.241.185.5
182.12.38.51 27.229.226.119 92.53.57.123 181.137.205.27