Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nagahama-shi

Region: Shiga

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: ZTV CO.,LTD

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
113.20.242.42 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/113.20.242.42/ 
 JP - 1H : (36)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : JP 
 NAME ASN : ASN9351 
 
 IP : 113.20.242.42 
 
 CIDR : 113.20.192.0/18 
 
 PREFIX COUNT : 23 
 
 UNIQUE IP COUNT : 151552 
 
 
 WYKRYTE ATAKI Z ASN9351 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 2 
 
 DateTime : 2019-10-11 05:48:39 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-11 18:24:56
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.20.242.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38571
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.20.242.194.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019081700 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 18 02:23:25 CST 2019
;; MSG SIZE  rcvd: 118
Host info
194.242.20.113.in-addr.arpa domain name pointer pc237194.ztv.ne.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
194.242.20.113.in-addr.arpa	name = pc237194.ztv.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
95.46.40.17 attackbotsspam
Dec 24 16:31:29 icinga sshd[25573]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=95.46.40.17
Dec 24 16:31:30 icinga sshd[25573]: Failed password for invalid user user from 95.46.40.17 port 52276 ssh2
...
2019-12-25 03:33:57
128.199.216.250 attack
$f2bV_matches
2019-12-25 03:37:20
81.25.226.142 attackspambots
Portscan or hack attempt detected by psad/fwsnort
2019-12-25 03:32:27
139.220.192.57 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-25 03:35:03
121.164.233.83 attackspam
$f2bV_matches
2019-12-25 03:50:44
185.227.64.16 attackspam
proto=tcp  .  spt=60474  .  dpt=25  .     (Found on   Blocklist de  Dec 23)     (459)
2019-12-25 03:45:00
197.62.174.35 attackbots
Dec 24 20:14:34 ks10 sshd[26633]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=197.62.174.35 
Dec 24 20:14:37 ks10 sshd[26633]: Failed password for invalid user hasimoto from 197.62.174.35 port 24848 ssh2
...
2019-12-25 04:02:07
114.57.188.88 attackbots
Unauthorized connection attempt from IP address 114.57.188.88 on Port 25(SMTP)
2019-12-25 03:42:14
181.143.157.242 attackbotsspam
proto=tcp  .  spt=52080  .  dpt=25  .     (Listed on    abuseat-org plus barracuda and spamcop)     (455)
2019-12-25 03:57:07
139.162.125.159 attackbots
firewall-block, port(s): 443/tcp
2019-12-25 03:43:18
1.55.246.28 attackbotsspam
Unauthorized connection attempt from IP address 1.55.246.28 on Port 445(SMB)
2019-12-25 03:59:09
88.200.215.235 attackspam
Unauthorized connection attempt from IP address 88.200.215.235 on Port 445(SMB)
2019-12-25 04:08:49
185.176.27.166 attack
Dec 24 20:33:48 debian-2gb-nbg1-2 kernel: \[868766.685139\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.176.27.166 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=2090 PROTO=TCP SPT=52498 DPT=3577 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-25 03:35:50
178.252.132.98 attack
Unauthorized connection attempt from IP address 178.252.132.98 on Port 445(SMB)
2019-12-25 03:43:01
201.238.239.151 attack
Dec 24 20:32:53 [snip] sshd[12166]: Invalid user fishers from 201.238.239.151 port 50607
Dec 24 20:32:53 [snip] sshd[12166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.238.239.151
Dec 24 20:32:55 [snip] sshd[12166]: Failed password for invalid user fishers from 201.238.239.151 port 50607 ssh2[...]
2019-12-25 03:52:43

Recently Reported IPs

173.136.242.161 91.214.82.43 49.94.227.133 54.36.149.64
144.74.63.126 1.59.25.35 37.47.198.178 177.21.130.5
44.1.83.227 40.210.86.67 181.167.219.161 164.107.113.157
44.157.76.51 42.3.104.161 78.111.61.209 190.157.51.98
120.203.81.137 155.185.102.11 174.1.250.98 87.204.167.252