Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 91.142.131.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49009
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;91.142.131.2.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022703 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 09:28:58 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 2.131.142.91.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 91.142.131.2.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
178.128.57.183 attack
abasicmove.de 178.128.57.183 [08/May/2020:20:18:40 +0200] "POST /wp-login.php HTTP/1.1" 200 6094 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
abasicmove.de 178.128.57.183 [08/May/2020:20:18:45 +0200] "POST /wp-login.php HTTP/1.1" 200 5957 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-16 14:41:26
61.182.230.41 attackbots
May 16 03:42:32 master sshd[20777]: Failed password for invalid user tomcat from 61.182.230.41 port 54501 ssh2
2020-05-16 15:10:06
180.76.162.19 attack
Invalid user deploy from 180.76.162.19 port 33532
2020-05-16 14:42:47
111.93.156.74 attackbotsspam
Invalid user debian from 111.93.156.74 port 45134
2020-05-16 14:40:52
42.104.97.238 attackbots
42.104.97.238 - - [15/May/2020:09:33:45 +0200] "GET /wp-login.php HTTP/1.1" 200 6451 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
42.104.97.238 - - [15/May/2020:09:33:46 +0200] "POST /wp-login.php HTTP/1.1" 200 6702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
42.104.97.238 - - [15/May/2020:09:33:47 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-16 15:12:50
115.79.136.117 attackbotsspam
Unauthorized connection attempt from IP address 115.79.136.117 on Port 445(SMB)
2020-05-16 15:29:58
45.55.214.64 attack
Invalid user oracle from 45.55.214.64 port 48266
2020-05-16 15:20:42
66.131.216.79 attack
May 13 20:22:17 : SSH login attempts with invalid user
2020-05-16 15:20:26
178.128.123.111 attack
Invalid user ranger from 178.128.123.111 port 50336
2020-05-16 14:56:38
106.12.218.2 attackspam
SSH brute-force attempt
2020-05-16 15:15:17
157.245.104.96 attack
Total attacks: 3
2020-05-16 14:49:06
106.12.221.77 attackspambots
 TCP (SYN) 106.12.221.77:55527 -> port 8030, len 44
2020-05-16 14:45:08
209.59.143.230 attack
May 16 04:35:11 vps sshd[5675]: Failed password for invalid user sergio from 209.59.143.230 port 40289 ssh2
May 16 04:40:40 vps sshd[35290]: Invalid user deploy from 209.59.143.230 port 37482
May 16 04:40:40 vps sshd[35290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=structure.pm
May 16 04:40:42 vps sshd[35290]: Failed password for invalid user deploy from 209.59.143.230 port 37482 ssh2
May 16 04:46:28 vps sshd[61133]: Invalid user deploy from 209.59.143.230 port 34689
...
2020-05-16 15:23:41
114.67.72.229 attackbots
May 15 22:41:44 ny01 sshd[670]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.72.229
May 15 22:41:46 ny01 sshd[670]: Failed password for invalid user ning from 114.67.72.229 port 34302 ssh2
May 15 22:44:40 ny01 sshd[1131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.72.229
2020-05-16 14:43:16
41.231.54.59 attack
Automatic report - WordPress Brute Force
2020-05-16 14:50:42

Recently Reported IPs

71.198.222.218 234.31.201.202 175.208.241.186 137.135.184.232
194.53.146.193 253.137.254.235 161.49.107.196 58.251.120.220
163.129.95.142 174.59.221.232 189.125.5.47 84.114.123.148
181.72.51.166 97.102.107.101 104.197.197.219 228.223.174.97
238.47.67.131 81.29.91.107 255.52.148.73 18.208.253.165