Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 69.142.69.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2690
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;69.142.69.245.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 00:50:07 CST 2025
;; MSG SIZE  rcvd: 106
Host info
245.69.142.69.in-addr.arpa domain name pointer c-69-142-69-245.hsd1.nj.comcast.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
245.69.142.69.in-addr.arpa	name = c-69-142-69-245.hsd1.nj.comcast.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
179.189.235.228 attackspambots
Sep 30 06:38:15 MK-Soft-Root1 sshd[27551]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=179.189.235.228 
Sep 30 06:38:17 MK-Soft-Root1 sshd[27551]: Failed password for invalid user km from 179.189.235.228 port 34408 ssh2
...
2019-09-30 12:48:22
134.175.23.46 attackspambots
Reported by AbuseIPDB proxy server.
2019-09-30 12:49:33
199.195.252.213 attackspam
Sep 30 06:54:01 www sshd\[25565\]: Invalid user iinstall from 199.195.252.213Sep 30 06:54:03 www sshd\[25565\]: Failed password for invalid user iinstall from 199.195.252.213 port 49066 ssh2Sep 30 06:58:09 www sshd\[25652\]: Invalid user test2 from 199.195.252.213
...
2019-09-30 13:01:28
92.242.44.146 attackspam
Sep 29 18:56:49 hpm sshd\[4786\]: Invalid user weblogic from 92.242.44.146
Sep 29 18:56:49 hpm sshd\[4786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.44.146
Sep 29 18:56:51 hpm sshd\[4786\]: Failed password for invalid user weblogic from 92.242.44.146 port 49142 ssh2
Sep 29 19:00:51 hpm sshd\[5116\]: Invalid user nginx from 92.242.44.146
Sep 29 19:00:51 hpm sshd\[5116\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.242.44.146
2019-09-30 13:16:17
110.35.79.23 attackspam
Sep 30 06:57:33 www5 sshd\[58502\]: Invalid user user from 110.35.79.23
Sep 30 06:57:33 www5 sshd\[58502\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.79.23
Sep 30 06:57:35 www5 sshd\[58502\]: Failed password for invalid user user from 110.35.79.23 port 47126 ssh2
...
2019-09-30 13:41:46
13.58.253.103 attack
Sep 30 06:41:43 vps691689 sshd[30625]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.58.253.103
Sep 30 06:41:45 vps691689 sshd[30625]: Failed password for invalid user owncloud from 13.58.253.103 port 56430 ssh2
...
2019-09-30 12:59:01
46.101.26.63 attack
Sep 30 10:07:19 gw1 sshd[24624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.26.63
Sep 30 10:07:22 gw1 sshd[24624]: Failed password for invalid user ftpuser from 46.101.26.63 port 57547 ssh2
...
2019-09-30 13:21:57
157.157.77.168 attack
Sep 30 04:10:32 hcbbdb sshd\[6224\]: Invalid user coralyn from 157.157.77.168
Sep 30 04:10:32 hcbbdb sshd\[6224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.157.77.168
Sep 30 04:10:34 hcbbdb sshd\[6224\]: Failed password for invalid user coralyn from 157.157.77.168 port 55836 ssh2
Sep 30 04:14:34 hcbbdb sshd\[6691\]: Invalid user fxpass from 157.157.77.168
Sep 30 04:14:34 hcbbdb sshd\[6691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.157.77.168
2019-09-30 12:53:18
153.36.242.143 attackspambots
$f2bV_matches
2019-09-30 13:01:57
125.74.10.146 attack
Sep 29 19:20:05 tdfoods sshd\[4709\]: Invalid user tss3 from 125.74.10.146
Sep 29 19:20:06 tdfoods sshd\[4709\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.10.146
Sep 29 19:20:07 tdfoods sshd\[4709\]: Failed password for invalid user tss3 from 125.74.10.146 port 53796 ssh2
Sep 29 19:25:38 tdfoods sshd\[5162\]: Invalid user tiberio from 125.74.10.146
Sep 29 19:25:38 tdfoods sshd\[5162\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.74.10.146
2019-09-30 13:27:01
185.105.238.199 attackspam
Invalid user yb from 185.105.238.199 port 40772
2019-09-30 13:05:35
181.39.37.101 attackspam
Sep 30 00:57:10 ny01 sshd[18271]: Failed password for root from 181.39.37.101 port 53302 ssh2
Sep 30 01:01:43 ny01 sshd[19308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.39.37.101
Sep 30 01:01:45 ny01 sshd[19308]: Failed password for invalid user rapport from 181.39.37.101 port 36862 ssh2
2019-09-30 13:06:46
139.198.12.65 attackspambots
Sep 30 06:30:39 vps01 sshd[4832]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.12.65
Sep 30 06:30:41 vps01 sshd[4832]: Failed password for invalid user QWElong123 from 139.198.12.65 port 34892 ssh2
2019-09-30 13:03:02
106.67.38.253 attackspam
445/tcp
[2019-09-30]1pkt
2019-09-30 12:56:56
139.199.21.245 attack
Sep 29 19:03:51 eddieflores sshd\[24945\]: Invalid user uy from 139.199.21.245
Sep 29 19:03:51 eddieflores sshd\[24945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.21.245
Sep 29 19:03:53 eddieflores sshd\[24945\]: Failed password for invalid user uy from 139.199.21.245 port 58625 ssh2
Sep 29 19:09:32 eddieflores sshd\[25492\]: Invalid user sinusbot from 139.199.21.245
Sep 29 19:09:32 eddieflores sshd\[25492\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.21.245
2019-09-30 13:11:37

Recently Reported IPs

33.51.29.124 59.32.183.206 209.217.36.73 4.57.243.102
169.240.170.170 173.68.18.143 170.117.180.216 20.69.125.5
142.164.226.165 99.155.186.218 31.214.240.139 175.203.126.83
159.252.185.18 245.203.215.5 245.33.212.10 166.50.236.186
21.238.53.220 199.177.182.204 8.31.112.147 36.151.34.25