Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 85.121.142.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32759
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;85.121.142.142.			IN	A

;; AUTHORITY SECTION:
.			415	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 02:39:16 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 142.142.121.85.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 142.142.121.85.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
186.67.129.34 attackspambots
Mar 18 23:14:36 jane sshd[1536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.67.129.34 
Mar 18 23:14:38 jane sshd[1536]: Failed password for invalid user rootme from 186.67.129.34 port 42538 ssh2
...
2020-03-19 07:55:16
193.57.40.38 attack
Multiport scan : 4 ports scanned 6379 6800 8088 8983
2020-03-19 07:56:47
202.28.217.30 attackbots
03/18/2020-18:13:53.819165 202.28.217.30 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-03-19 08:30:42
185.156.73.67 attack
Port scan: Attack repeated for 24 hours
2020-03-19 08:15:55
129.211.81.203 attackspambots
Mar 19 02:05:45 www sshd\[3392\]: Failed password for root from 129.211.81.203 port 45080 ssh2Mar 19 02:10:07 www sshd\[3545\]: Failed password for root from 129.211.81.203 port 48608 ssh2Mar 19 02:14:36 www sshd\[3672\]: Failed password for root from 129.211.81.203 port 52260 ssh2
...
2020-03-19 08:16:57
178.128.154.236 attackspambots
178.128.154.236 - - [18/Mar/2020:22:38:14 +0000] "POST /wp-login.php HTTP/1.1" 200 6627 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
178.128.154.236 - - [18/Mar/2020:22:38:14 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-03-19 08:20:08
125.124.70.22 attack
Mar 19 03:07:32 gw1 sshd[12596]: Failed password for root from 125.124.70.22 port 57016 ssh2
...
2020-03-19 08:33:34
106.54.123.84 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2020-03-19 08:11:19
212.92.108.234 attackspambots
18 mrt 2020 23:12:07 - A failed connection attempt was detected from IP address 212.92.108.234. This IP address is not whitelisted and will be blocked following several failed attempts to connect. Provided username: TEACHER
2020-03-19 08:00:16
118.89.232.60 attackbotsspam
Invalid user frappe from 118.89.232.60 port 60692
2020-03-19 08:24:27
128.199.244.150 attack
Automatic report - XMLRPC Attack
2020-03-19 08:13:46
111.229.142.210 attackspambots
SSH Invalid Login
2020-03-19 08:04:25
51.15.43.15 attack
Fail2Ban Ban Triggered (2)
2020-03-19 08:30:20
176.58.96.156 attackspam
Portscan or hack attempt detected by psad/fwsnort
2020-03-19 08:21:19
201.17.147.86 attackspam
Unauthorised access (Mar 19) SRC=201.17.147.86 LEN=52 TTL=116 ID=25932 DF TCP DPT=1433 WINDOW=8192 SYN
2020-03-19 07:55:49

Recently Reported IPs

129.62.248.228 151.97.160.121 16.221.167.242 177.63.230.7
143.228.210.73 135.254.112.185 183.50.143.55 151.227.65.79
161.35.31.143 243.139.107.56 114.94.27.19 212.139.75.232
100.89.156.30 164.90.64.60 151.62.135.236 166.255.94.211
125.218.116.18 17.89.227.221 232.232.67.41 227.103.207.141