Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kobe

Region: Hyōgo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.148.158.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 63316
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.148.158.242.		IN	A

;; AUTHORITY SECTION:
.			10800	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020091202 1800 900 604800 86400

;; Query time: 1 msec
;; SERVER: 100.100.2.138#53(100.100.2.138)
;; WHEN: Sun Sep 13 08:23:39 CST 2020
;; MSG SIZE  rcvd: 119

Host info
242.158.148.113.in-addr.arpa domain name pointer KD113148158242.ppp-bb.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.158.148.113.in-addr.arpa	name = KD113148158242.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
123.206.174.21 attackspambots
Oct  5 11:26:50 localhost sshd\[6770\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.174.21  user=root
Oct  5 11:26:53 localhost sshd\[6770\]: Failed password for root from 123.206.174.21 port 27453 ssh2
Oct  5 11:31:47 localhost sshd\[6950\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.174.21  user=root
Oct  5 11:31:49 localhost sshd\[6950\]: Failed password for root from 123.206.174.21 port 64903 ssh2
Oct  5 11:36:40 localhost sshd\[7137\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.174.21  user=root
...
2019-10-05 23:00:30
51.77.137.211 attackbotsspam
2019-10-05T14:34:03.297583abusebot-2.cloudsearch.cf sshd\[16890\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.ip-51-77-137.eu  user=root
2019-10-05 22:44:12
195.72.159.90 attackspam
HTTP/80/443 Probe, Hack -
2019-10-05 22:44:31
60.173.178.149 attackbots
Telnet Server BruteForce Attack
2019-10-05 22:57:13
73.71.231.134 attackspam
$f2bV_matches
2019-10-05 23:11:28
178.222.15.246 attackspam
Telnet Server BruteForce Attack
2019-10-05 22:47:28
176.99.159.24 attackspambots
[SatOct0513:32:47.3751682019][:error][pid11076:tid46955190343424][client176.99.159.24:55343][client176.99.159.24]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:user-agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"395"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0detected\(DisableifyouwanttoallowMSIE6\)"][severity"WARNING"][hostname"148.251.104.75"][uri"/public/index.php"][unique_id"XZh-X9p5TuYoNtR1NxLRcgAAAUY"][SatOct0513:37:12.1057602019][:error][pid11230:tid46955292047104][client176.99.159.24:51382][client176.99.159.24]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(MSWebServicesClientProtocol\|WormlyBot\|webauth@cmcm\\\\\\\\.com\)"against"REQUEST_HEADERS:user-agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"395"][id"397989"][rev"1"][msg"Atomicorp.comWAFRules:MSIE6.0dete
2019-10-05 22:40:55
210.57.22.204 attackspambots
$f2bV_matches
2019-10-05 22:45:38
150.109.63.147 attackspambots
Oct  5 16:13:36 markkoudstaal sshd[16114]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.63.147
Oct  5 16:13:38 markkoudstaal sshd[16114]: Failed password for invalid user 123Grande from 150.109.63.147 port 34426 ssh2
Oct  5 16:17:46 markkoudstaal sshd[16525]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.63.147
2019-10-05 22:31:17
45.55.190.106 attack
Oct  5 16:49:58 vps647732 sshd[15789]: Failed password for root from 45.55.190.106 port 42614 ssh2
...
2019-10-05 22:54:15
203.110.179.26 attack
Triggered by Fail2Ban at Vostok web server
2019-10-05 22:33:48
31.167.203.92 attackbotsspam
Unauthorised access (Oct  5) SRC=31.167.203.92 LEN=52 TOS=0x10 PREC=0x40 TTL=114 ID=4680 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-05 23:10:11
74.208.47.8 attackbots
Hit on /wp-login.php
2019-10-05 22:48:02
134.209.52.93 attackbots
Oct  5 21:51:27 webhost01 sshd[22216]: Failed password for root from 134.209.52.93 port 60426 ssh2
...
2019-10-05 23:02:52
119.146.145.104 attackspam
Oct  5 02:58:59 sachi sshd\[29831\]: Invalid user Admin@600 from 119.146.145.104
Oct  5 02:58:59 sachi sshd\[29831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.145.104
Oct  5 02:59:01 sachi sshd\[29831\]: Failed password for invalid user Admin@600 from 119.146.145.104 port 2566 ssh2
Oct  5 03:04:51 sachi sshd\[30328\]: Invalid user Root from 119.146.145.104
Oct  5 03:04:51 sachi sshd\[30328\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.146.145.104
2019-10-05 22:34:11

Recently Reported IPs

89.28.89.40 74.103.26.61 109.62.117.203 31.234.152.63
113.247.244.7 94.212.177.22 65.230.206.229 41.249.138.84
142.240.254.231 96.81.78.54 110.222.36.172 2.67.211.104
82.120.165.20 108.137.189.161 97.253.112.39 67.8.163.158
111.52.151.6 148.63.133.34 174.192.14.34 182.181.90.117