Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.157.4.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32862
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;95.157.4.142.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 20:38:26 CST 2025
;; MSG SIZE  rcvd: 105
Host info
142.4.157.95.in-addr.arpa domain name pointer 95.157.4.142.dyn.pyur.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.4.157.95.in-addr.arpa	name = 95.157.4.142.dyn.pyur.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
163.172.38.80 attackspambots
Sep 28 20:44:09 xeon sshd[48233]: Failed password for invalid user nagios from 163.172.38.80 port 59804 ssh2
2020-09-29 03:23:01
81.68.161.45 attackspambots
Sep 27 18:09:58 pixelmemory sshd[1195575]: Failed password for root from 81.68.161.45 port 40392 ssh2
Sep 27 18:14:03 pixelmemory sshd[1196855]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.161.45  user=root
Sep 27 18:14:06 pixelmemory sshd[1196855]: Failed password for root from 81.68.161.45 port 47408 ssh2
Sep 27 18:18:21 pixelmemory sshd[1197960]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.68.161.45  user=root
Sep 27 18:18:23 pixelmemory sshd[1197960]: Failed password for root from 81.68.161.45 port 54438 ssh2
...
2020-09-29 03:19:07
49.234.126.35 attack
Sep 28 18:37:29 django-0 sshd[3994]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.126.35  user=root
Sep 28 18:37:31 django-0 sshd[3994]: Failed password for root from 49.234.126.35 port 47048 ssh2
...
2020-09-29 03:07:04
119.123.68.77 attackbots
SSH/22 MH Probe, BF, Hack -
2020-09-29 03:32:09
52.247.206.120 attack
/wp-includes/js/jquery/jquery.js
2020-09-29 03:35:45
54.216.8.252 attackspam
Sep 28 19:22:10 vserver sshd\[5650\]: Invalid user applmgr from 54.216.8.252Sep 28 19:22:12 vserver sshd\[5650\]: Failed password for invalid user applmgr from 54.216.8.252 port 59892 ssh2Sep 28 19:25:53 vserver sshd\[5673\]: Invalid user r from 54.216.8.252Sep 28 19:25:54 vserver sshd\[5673\]: Failed password for invalid user r from 54.216.8.252 port 41170 ssh2
...
2020-09-29 03:10:48
191.253.2.196 attack
1601273450 - 09/28/2020 13:10:50 Host: wlan-191-253-2-196.clickrede.com.br/191.253.2.196 Port: 23 TCP Blocked
...
2020-09-29 03:37:19
193.239.147.179 attackbotsspam
Sep 28 18:14:23 mail postfix/smtpd[108186]: warning: unknown[193.239.147.179]: SASL PLAIN authentication failed: generic failure
Sep 28 18:14:23 mail postfix/smtpd[108186]: warning: unknown[193.239.147.179]: SASL LOGIN authentication failed: generic failure
Sep 28 18:14:23 mail postfix/smtpd[108186]: warning: unknown[193.239.147.179]: SASL CRAM-MD5 authentication failed: authentication failure
...
2020-09-29 03:11:28
106.13.165.247 attackspam
Time:     Sun Sep 27 09:06:58 2020 +0000
IP:       106.13.165.247 (CN/China/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 27 08:43:18 3 sshd[2877]: Invalid user ftp1 from 106.13.165.247 port 39250
Sep 27 08:43:20 3 sshd[2877]: Failed password for invalid user ftp1 from 106.13.165.247 port 39250 ssh2
Sep 27 09:02:38 3 sshd[22758]: Invalid user serverpilot from 106.13.165.247 port 41760
Sep 27 09:02:40 3 sshd[22758]: Failed password for invalid user serverpilot from 106.13.165.247 port 41760 ssh2
Sep 27 09:06:53 3 sshd[3007]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.165.247  user=root
2020-09-29 03:10:24
106.13.82.231 attack
Sep 29 00:29:37 itv-usvr-01 sshd[11989]: Invalid user usuario from 106.13.82.231
Sep 29 00:29:37 itv-usvr-01 sshd[11989]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.82.231
Sep 29 00:29:37 itv-usvr-01 sshd[11989]: Invalid user usuario from 106.13.82.231
Sep 29 00:29:39 itv-usvr-01 sshd[11989]: Failed password for invalid user usuario from 106.13.82.231 port 45596 ssh2
Sep 29 00:35:29 itv-usvr-01 sshd[12264]: Invalid user deploy from 106.13.82.231
2020-09-29 03:09:16
201.80.21.131 attackspam
Triggered by Fail2Ban at Ares web server
2020-09-29 03:33:21
132.145.81.240 attackspambots
Invalid user postgres from 132.145.81.240 port 55070
2020-09-29 03:21:02
186.18.41.1 attackspam
SSH login attempts.
2020-09-29 03:02:34
59.124.205.214 attackbots
(sshd) Failed SSH login from 59.124.205.214 (TW/Taiwan/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 28 13:01:44 server2 sshd[31516]: Invalid user kibana from 59.124.205.214
Sep 28 13:01:46 server2 sshd[31516]: Failed password for invalid user kibana from 59.124.205.214 port 45612 ssh2
Sep 28 13:13:22 server2 sshd[19151]: Invalid user mathserv from 59.124.205.214
Sep 28 13:13:24 server2 sshd[19151]: Failed password for invalid user mathserv from 59.124.205.214 port 48440 ssh2
Sep 28 13:17:23 server2 sshd[27180]: Invalid user new from 59.124.205.214
2020-09-29 03:14:12
157.230.109.166 attack
SSH login attempts.
2020-09-29 03:13:24

Recently Reported IPs

135.235.191.183 199.126.231.218 250.105.63.103 86.68.206.85
189.169.153.139 212.161.174.69 41.8.115.243 20.0.199.17
229.252.199.102 4.226.33.42 170.73.2.5 146.157.12.227
121.241.15.236 231.180.11.91 239.247.31.102 48.127.16.78
49.233.249.209 226.206.150.69 136.121.160.217 214.95.152.78