Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.42.200.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25554
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.42.200.207.			IN	A

;; AUTHORITY SECTION:
.			245	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060400 1800 900 604800 86400

;; Query time: 22 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jun 04 20:23:07 CST 2024
;; MSG SIZE  rcvd: 107
Host info
207.200.42.113.in-addr.arpa domain name pointer 113x42x200x207.ap113.ftth.ucom.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.200.42.113.in-addr.arpa	name = 113x42x200x207.ap113.ftth.ucom.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.75.169.236 attackspam
Jun 29 07:00:29 [munged] sshd[14004]: Invalid user oracle from 51.75.169.236 port 49893
Jun 29 07:00:29 [munged] sshd[14004]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.169.236
2019-06-29 14:00:46
92.118.161.45 attackspam
5060/udp 5353/udp 5351/udp...
[2019-04-28/06-28]76pkt,42pt.(tcp),7pt.(udp)
2019-06-29 13:53:25
61.148.29.198 attack
Brute force attempt
2019-06-29 14:18:33
123.188.246.253 attack
5500/tcp 5500/tcp 5500/tcp
[2019-06-25/28]3pkt
2019-06-29 13:44:29
202.182.55.90 attack
firewall-block, port(s): 80/tcp
2019-06-29 14:11:03
106.12.100.179 attack
Jun 29 01:53:27 dedicated sshd[14214]: Invalid user forge from 106.12.100.179 port 38176
2019-06-29 14:05:09
185.173.35.17 attack
138/tcp 5061/tcp 16010/tcp...
[2019-04-28/06-28]86pkt,45pt.(tcp),5pt.(udp)
2019-06-29 13:54:31
58.209.19.24 attack
SASL broute force
2019-06-29 14:13:18
79.157.122.213 attack
2019-06-27T01:27:15.685389ldap.arvenenaske.de sshd[25485]: Connection from 79.157.122.213 port 49318 on 5.199.128.55 port 22
2019-06-27T01:27:16.803811ldap.arvenenaske.de sshd[25485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.157.122.213  user=r.r
2019-06-27T01:27:18.698467ldap.arvenenaske.de sshd[25485]: Failed password for r.r from 79.157.122.213 port 49318 ssh2
2019-06-27T01:30:07.199644ldap.arvenenaske.de sshd[25487]: Connection from 79.157.122.213 port 53610 on 5.199.128.55 port 22
2019-06-27T01:30:07.553721ldap.arvenenaske.de sshd[25487]: Invalid user adam from 79.157.122.213 port 53610
2019-06-27T01:30:07.561362ldap.arvenenaske.de sshd[25487]: pam_sss(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.157.122.213 user=adam
2019-06-27T01:30:07.562389ldap.arvenenaske.de sshd[25487]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.157.122.213
201........
------------------------------
2019-06-29 14:20:12
198.50.197.223 attackbotsspam
Brute-Force E-Mail-Server attack
2019-06-29 14:22:22
185.142.236.35 attackbotsspam
32400/tcp 3689/tcp 137/udp...
[2019-04-28/06-28]429pkt,215pt.(tcp),30pt.(udp)
2019-06-29 14:02:38
213.59.117.178 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-04-29/06-28]12pkt,1pt.(tcp)
2019-06-29 13:38:58
184.155.215.71 attackspambots
2019-06-29T05:31:11.116981stark.klein-stark.info sshd\[4818\]: Invalid user a4abroad from 184.155.215.71 port 56154
2019-06-29T05:31:11.122363stark.klein-stark.info sshd\[4818\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=184-155-215-71.cpe.cableone.net
2019-06-29T05:31:13.149772stark.klein-stark.info sshd\[4818\]: Failed password for invalid user a4abroad from 184.155.215.71 port 56154 ssh2
...
2019-06-29 13:42:20
106.13.39.154 attackbotsspam
Invalid user public from 106.13.39.154 port 48998
2019-06-29 14:24:15
81.22.45.63 attack
Unauthorized connection attempt from IP address 81.22.45.63 on Port 3389(RDP)
2019-06-29 13:38:27

Recently Reported IPs

168.93.139.19 145.143.253.130 70.183.227.244 159.4.193.16
151.247.60.249 12.178.196.79 173.100.197.94 194.209.80.177
138.190.129.213 37.133.130.4 182.0.41.252 69.41.222.183
204.139.86.65 81.128.153.239 225.44.207.186 216.44.18.240
171.185.15.168 69.150.87.54 33.43.4.151 249.146.213.57