Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 101.140.49.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65287
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;101.140.49.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 272 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 14:26:46 CST 2025
;; MSG SIZE  rcvd: 107
Host info
242.49.140.101.in-addr.arpa domain name pointer 101-140-49-242f1.wky1.eonet.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.49.140.101.in-addr.arpa	name = 101-140-49-242f1.wky1.eonet.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.4.238.230 attackspam
Jan 11 15:29:12 lnxweb61 sshd[30103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.4.238.230
2020-01-11 23:08:39
142.93.251.1 attack
$f2bV_matches
2020-01-11 23:00:27
142.93.241.93 attack
Unauthorized connection attempt detected from IP address 142.93.241.93 to port 2220 [J]
2020-01-11 23:00:49
185.175.93.105 attack
01/11/2020-16:08:49.199385 185.175.93.105 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-11 23:10:13
142.44.160.214 attackspam
Jan 11 15:52:05 vps691689 sshd[15068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.44.160.214
Jan 11 15:52:08 vps691689 sshd[15068]: Failed password for invalid user deploy from 142.44.160.214 port 36905 ssh2
...
2020-01-11 23:09:54
125.88.36.218 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 11-01-2020 13:10:15.
2020-01-11 23:27:27
14.63.167.192 attack
$f2bV_matches
2020-01-11 23:26:19
222.174.10.89 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-11 23:16:48
37.59.107.31 attackspam
37.59.107.31 - - [11/Jan/2020:14:10:44 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.59.107.31 - - [11/Jan/2020:14:10:44 +0100] "POST /wp-login.php HTTP/1.1" 200 2297 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.59.107.31 - - [11/Jan/2020:14:10:44 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.59.107.31 - - [11/Jan/2020:14:10:44 +0100] "POST /wp-login.php HTTP/1.1" 200 2272 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.59.107.31 - - [11/Jan/2020:14:10:44 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.59.107.31 - - [11/Jan/2020:14:10:45 +0100] "POST /wp-login.php HTTP/1.1" 200 2272 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-11 22:54:02
140.143.208.132 attackbots
$f2bV_matches
2020-01-11 23:20:45
144.121.28.206 attackspambots
$f2bV_matches
2020-01-11 22:54:33
132.248.88.78 attackspambots
Jan 11 11:16:12 firewall sshd[26414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.248.88.78  user=root
Jan 11 11:16:13 firewall sshd[26414]: Failed password for root from 132.248.88.78 port 50411 ssh2
Jan 11 11:20:12 firewall sshd[26522]: Invalid user es from 132.248.88.78
...
2020-01-11 22:57:54
142.44.184.226 attack
Brute-force attempt banned
2020-01-11 23:09:18
14.29.162.139 attackbotsspam
$f2bV_matches
2020-01-11 23:30:04
217.112.142.204 attack
Postfix RBL failed
2020-01-11 23:18:31

Recently Reported IPs

166.33.61.102 34.123.223.11 97.172.247.18 251.21.64.209
83.214.252.199 134.70.15.197 32.128.211.185 209.33.69.73
180.56.50.188 178.3.80.99 163.153.111.229 255.178.112.69
187.234.11.24 88.182.238.140 120.213.17.170 106.71.253.36
49.39.14.197 74.181.253.145 13.80.151.131 173.144.45.28