Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Verizon

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 97.137.214.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62399
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;97.137.214.142.			IN	A

;; AUTHORITY SECTION:
.			590	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023012101 1800 900 604800 86400

;; Query time: 77 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 22 07:46:05 CST 2023
;; MSG SIZE  rcvd: 107
Host info
142.214.137.97.in-addr.arpa domain name pointer 142.sub-97-137-214.myvzw.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.214.137.97.in-addr.arpa	name = 142.sub-97-137-214.myvzw.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
165.22.144.206 attack
SSH Brute Force, server-1 sshd[15426]: Failed password for root from 165.22.144.206 port 40206 ssh2
2019-09-13 19:14:43
113.61.110.235 attack
SSH Brute-Force reported by Fail2Ban
2019-09-13 17:49:11
69.131.146.100 attackspam
Sep 13 05:24:40 vps691689 sshd[6783]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=69.131.146.100
Sep 13 05:24:42 vps691689 sshd[6783]: Failed password for invalid user user from 69.131.146.100 port 46488 ssh2
...
2019-09-13 18:48:51
52.176.110.203 attack
Sep 13 06:45:23 tuotantolaitos sshd[11586]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.176.110.203
Sep 13 06:45:25 tuotantolaitos sshd[11586]: Failed password for invalid user dev from 52.176.110.203 port 55179 ssh2
...
2019-09-13 18:05:54
23.129.64.211 attackspambots
Sep 13 08:50:13 thevastnessof sshd[21529]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.129.64.211
...
2019-09-13 17:32:36
79.195.16.129 attackbotsspam
Automatic report - Port Scan Attack
2019-09-13 18:19:45
110.138.77.20 attackspam
Unauthorized connection attempt from IP address 110.138.77.20 on Port 445(SMB)
2019-09-13 18:23:03
206.189.149.170 attack
SSH Brute Force, server-1 sshd[15447]: Failed password for invalid user ftpuser from 206.189.149.170 port 45252 ssh2
2019-09-13 19:12:19
51.158.117.17 attackbots
Sep 13 11:43:28 vps01 sshd[5932]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.158.117.17
Sep 13 11:43:30 vps01 sshd[5932]: Failed password for invalid user 123 from 51.158.117.17 port 54894 ssh2
2019-09-13 18:01:38
183.81.66.60 attack
Unauthorized connection attempt from IP address 183.81.66.60 on Port 445(SMB)
2019-09-13 18:57:46
167.71.219.1 attackbotsspam
Sep 13 05:32:10 debian sshd\[2779\]: Invalid user test from 167.71.219.1 port 59448
Sep 13 05:32:10 debian sshd\[2779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.71.219.1
Sep 13 05:32:12 debian sshd\[2779\]: Failed password for invalid user test from 167.71.219.1 port 59448 ssh2
...
2019-09-13 17:49:37
81.30.208.114 attackbots
Sep 12 23:23:25 hiderm sshd\[15096\]: Invalid user web from 81.30.208.114
Sep 12 23:23:25 hiderm sshd\[15096\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.208.114.static.ufanet.ru
Sep 12 23:23:27 hiderm sshd\[15096\]: Failed password for invalid user web from 81.30.208.114 port 49555 ssh2
Sep 12 23:30:34 hiderm sshd\[15779\]: Invalid user user from 81.30.208.114
Sep 12 23:30:34 hiderm sshd\[15779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.30.208.114.static.ufanet.ru
2019-09-13 17:48:19
196.12.234.194 attack
Unauthorized connection attempt from IP address 196.12.234.194 on Port 445(SMB)
2019-09-13 17:48:40
191.23.126.236 attackbotsspam
Sep 13 03:03:01 jupiter sshd\[56689\]: Invalid user service from 191.23.126.236
Sep 13 03:03:01 jupiter sshd\[56689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.23.126.236
Sep 13 03:03:01 jupiter sshd\[56691\]: Invalid user admin from 191.23.126.236
Sep 13 03:03:01 jupiter sshd\[56691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.23.126.236
...
2019-09-13 18:07:05
187.111.23.14 attack
2019-09-13T09:12:18.983608abusebot-6.cloudsearch.cf sshd\[25965\]: Invalid user teamspeak123 from 187.111.23.14 port 57702
2019-09-13 17:51:04

Recently Reported IPs

164.151.211.32 217.44.27.35 186.81.229.89 56.118.179.142
23.43.179.181 206.141.196.111 237.112.94.104 165.252.136.175
0.58.170.39 67.165.21.11 51.137.211.197 200.107.152.51
13.173.159.211 245.116.12.76 185.17.63.136 210.115.13.60
197.67.110.230 222.184.193.142 143.59.221.114 78.198.36.234