Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.100.57.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34320
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.100.57.42.			IN	A

;; AUTHORITY SECTION:
.			446	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123100 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 31 19:10:12 CST 2021
;; MSG SIZE  rcvd: 106
Host info
42.57.100.111.in-addr.arpa domain name pointer KD111100057042.ppp-bb.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
42.57.100.111.in-addr.arpa	name = KD111100057042.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.161.27.75 attackspambots
Jun 12 22:56:35 debian-2gb-nbg1-2 kernel: \[14254115.253451\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=46.161.27.75 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=7026 PROTO=TCP SPT=46959 DPT=9800 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-13 05:32:04
13.56.12.14 attack
Unauthorized connection attempt detected from IP address 13.56.12.14 to port 8545
2020-06-13 06:04:05
66.42.21.47 attackbots
Unauthorized connection attempt detected from IP address 66.42.21.47 to port 23
2020-06-13 06:00:44
181.114.238.193 attackbotsspam
Unauthorized connection attempt detected from IP address 181.114.238.193 to port 8000
2020-06-13 05:45:08
133.242.53.108 attackspam
2020-06-12T22:48:02.093216vps773228.ovh.net sshd[28065]: Invalid user ansible from 133.242.53.108 port 41253
2020-06-12T22:48:04.169124vps773228.ovh.net sshd[28065]: Failed password for invalid user ansible from 133.242.53.108 port 41253 ssh2
2020-06-12T22:51:19.953868vps773228.ovh.net sshd[28137]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=kamaishisports.com  user=root
2020-06-12T22:51:22.389825vps773228.ovh.net sshd[28137]: Failed password for root from 133.242.53.108 port 39970 ssh2
2020-06-12T22:54:32.083339vps773228.ovh.net sshd[28187]: Invalid user wc from 133.242.53.108 port 38686
...
2020-06-13 05:32:42
106.13.6.116 attackspam
Jun 12 22:00:31 ajax sshd[25745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.6.116 
Jun 12 22:00:34 ajax sshd[25745]: Failed password for invalid user ryanwowie from 106.13.6.116 port 60406 ssh2
2020-06-13 05:29:09
200.150.82.106 attack
Unauthorized connection attempt detected from IP address 200.150.82.106 to port 23
2020-06-13 05:40:26
79.10.86.203 attackspam
firewall-block, port(s): 8000/tcp
2020-06-13 05:59:13
107.189.10.42 attackspam
Multiple web server 500 error code (Internal Error).
2020-06-13 05:35:36
187.237.231.22 attackspam
Unauthorized connection attempt detected from IP address 187.237.231.22 to port 5900
2020-06-13 05:41:56
132.148.104.135 attack
132.148.104.135 - - [12/Jun/2020:12:18:33 -0600] "GET /newsite/wp-includes/wlwmanifest.xml HTTP/1.1" 404 10057 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/70.0.3538.77 Safari/537.36"
...
2020-06-13 05:30:53
187.120.185.247 attackbotsspam
Unauthorized connection attempt detected from IP address 187.120.185.247 to port 23
2020-06-13 05:42:53
128.199.204.164 attackbots
Jun 12 19:59:48 prox sshd[21926]: Failed password for root from 128.199.204.164 port 34882 ssh2
Jun 12 20:13:54 prox sshd[12060]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.204.164
2020-06-13 05:29:25
187.146.227.153 attackspambots
Unauthorized connection attempt detected from IP address 187.146.227.153 to port 8000
2020-06-13 05:42:31
98.197.30.217 attackspam
Unauthorized connection attempt detected from IP address 98.197.30.217 to port 23
2020-06-13 05:54:43

Recently Reported IPs

133.211.30.110 252.165.17.165 140.246.133.128 45.10.234.183
139.255.156.220 251.62.214.166 194.147.32.58 0.159.137.249
29.5.201.79 35.200.79.111 95.236.171.53 246.37.141.92
204.147.198.197 97.213.231.175 5.25.151.84 5.253.206.156
198.199.115.246 208.122.254.114 161.109.194.227 120.195.25.112