Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Siegen

Region: North Rhine-Westphalia

Country: Germany

Internet Service Provider: Telekom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
b'
; <<>> DiG 9.11.3-1ubuntu1.15-Ubuntu <<>> 84.168.200.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5866
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 0, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 65494
;; QUESTION SECTION:
;84.168.200.142.			IN	A

;; Query time: 1 msec
;; SERVER: 127.0.0.53#53(127.0.0.53)
;; WHEN: Sat Jun 26 17:58:59 CST 2021
;; MSG SIZE  rcvd: 43

'
Host info
142.200.168.84.in-addr.arpa domain name pointer p54a8c88e.dip0.t-ipconnect.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.200.168.84.in-addr.arpa	name = p54a8c88e.dip0.t-ipconnect.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
186.232.15.144 attackspam
smtp auth brute force
2019-06-27 21:43:10
217.13.48.202 attackbotsspam
7071/tcp
[2019-06-27]1pkt
2019-06-27 22:34:15
51.75.26.106 attack
$f2bV_matches
2019-06-27 22:33:45
198.199.106.55 attackspambots
27.06.2019 13:10:45 SSH access blocked by firewall
2019-06-27 21:55:59
117.4.56.8 attack
445/tcp
[2019-06-27]1pkt
2019-06-27 22:27:34
87.13.45.155 attack
8080/tcp
[2019-06-27]1pkt
2019-06-27 22:17:28
123.192.25.172 attack
23/tcp
[2019-06-27]1pkt
2019-06-27 21:45:10
103.218.253.88 attackspambots
445/tcp
[2019-06-27]1pkt
2019-06-27 22:32:02
85.18.159.184 attackbots
445/tcp
[2019-06-27]1pkt
2019-06-27 22:25:30
41.42.167.192 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-27 12:54:28,893 INFO [amun_request_handler] PortScan Detected on Port: 445 (41.42.167.192)
2019-06-27 21:46:05
106.83.113.87 attackspam
22/tcp
[2019-06-27]1pkt
2019-06-27 21:48:42
101.51.147.66 attackbots
445/tcp
[2019-06-27]1pkt
2019-06-27 22:24:37
119.205.66.248 attackbotsspam
Jun 25 13:07:00 db01 sshd[29698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.205.66.248  user=r.r
Jun 25 13:07:02 db01 sshd[29698]: Failed password for r.r from 119.205.66.248 port 57619 ssh2
Jun 25 13:07:05 db01 sshd[29698]: Failed password for r.r from 119.205.66.248 port 57619 ssh2
Jun 25 13:07:07 db01 sshd[29698]: Failed password for r.r from 119.205.66.248 port 57619 ssh2
Jun 25 13:07:10 db01 sshd[29698]: Failed password for r.r from 119.205.66.248 port 57619 ssh2
Jun 25 13:07:12 db01 sshd[29698]: Failed password for r.r from 119.205.66.248 port 57619 ssh2
Jun 25 13:07:14 db01 sshd[29698]: Failed password for r.r from 119.205.66.248 port 57619 ssh2
Jun 25 13:07:14 db01 sshd[29698]: PAM 5 more authentication failures; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.205.66.248  user=r.r


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=119.205.66.248
2019-06-27 22:33:06
218.61.16.187 attack
1433/tcp
[2019-06-27]1pkt
2019-06-27 21:36:55
202.105.182.194 attackbotsspam
3389/tcp 3389/tcp
[2019-06-27]2pkt
2019-06-27 22:11:50

Recently Reported IPs

89.144.213.139 83.84.206.119 76.67.33.194 64.229.210.26
81.19.220.7 216.23.137.246 208.96.96.134 207.81.209.50
207.195.86.232 198.161.4.90 184.64.16.149 194.156.251.49
174.92.105.73 168.8.32.2 142.167.249.218 142.169.78.241
108.63.139.12 103.221.232.145 73.172.48.46 91.244.254.136