Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.158.42.109
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40293
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.158.42.109.			IN	A

;; AUTHORITY SECTION:
.			531	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024092601 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Sep 27 04:09:44 CST 2024
;; MSG SIZE  rcvd: 107
Host info
109.42.158.113.in-addr.arpa domain name pointer KD113158042109.ppp-bb.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
109.42.158.113.in-addr.arpa	name = KD113158042109.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.59.84.111 attackbots
$f2bV_matches
2020-01-11 23:52:40
14.187.21.231 attack
$f2bV_matches
2020-01-11 23:36:26
46.105.91.255 attack
Jan 11 16:31:58 debian-2gb-nbg1-2 kernel: \[1016026.154691\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=46.105.91.255 DST=195.201.40.59 LEN=438 TOS=0x10 PREC=0x20 TTL=51 ID=62889 DF PROTO=UDP SPT=5061 DPT=5060 LEN=418
2020-01-11 23:49:07
139.59.4.224 attackspambots
Unauthorized connection attempt detected from IP address 139.59.4.224 to port 2220 [J]
2020-01-11 23:58:58
134.209.115.206 attackspambots
Unauthorized connection attempt detected from IP address 134.209.115.206 to port 2220 [J]
2020-01-11 23:42:35
49.88.112.67 attack
Jan 11 17:06:08 v22018053744266470 sshd[6021]: Failed password for root from 49.88.112.67 port 13685 ssh2
Jan 11 17:07:09 v22018053744266470 sshd[6085]: Failed password for root from 49.88.112.67 port 52192 ssh2
...
2020-01-12 00:19:19
139.59.38.169 attack
$f2bV_matches
2020-01-12 00:00:20
139.59.0.243 attackbotsspam
Unauthorized connection attempt detected from IP address 139.59.0.243 to port 2220 [J]
2020-01-12 00:06:45
14.187.108.132 attackbotsspam
$f2bV_matches
2020-01-11 23:37:23
14.111.93.237 attackbotsspam
$f2bV_matches
2020-01-11 23:45:59
139.59.46.243 attackspambots
$f2bV_matches
2020-01-11 23:57:26
67.205.57.217 attackspambots
Automatic report - XMLRPC Attack
2020-01-12 00:07:54
139.199.219.235 attackspam
$f2bV_matches
2020-01-12 00:16:12
207.154.206.75 attack
Wordpress XMLRPC attack
2020-01-11 23:55:22
171.245.88.135 attackspam
Postfix RBL failed
2020-01-11 23:50:30

Recently Reported IPs

113.159.12.43 113.154.86.206 113.156.18.56 113.158.9.24
113.158.95.194 113.156.40.121 113.159.179.181 113.159.226.77
113.159.231.134 113.158.50.73 113.159.152.181 113.156.74.115
113.159.215.5 113.156.75.155 113.159.2.172 113.159.73.220
113.156.94.136 113.158.210.96 113.158.80.68 113.157.47.165