Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Abiko

Region: Chiba

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.42.21.182
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4546
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;113.42.21.182.			IN	A

;; AUTHORITY SECTION:
.			362	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100202 1800 900 604800 86400

;; Query time: 92 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 03 09:51:37 CST 2020
;; MSG SIZE  rcvd: 117
Host info
182.21.42.113.in-addr.arpa domain name pointer 113x42x21x182.ap113.ftth.ucom.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
182.21.42.113.in-addr.arpa	name = 113x42x21x182.ap113.ftth.ucom.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
148.70.24.20 attackspam
Unauthorized connection attempt detected from IP address 148.70.24.20 to port 2220 [J]
2020-02-01 23:10:56
1.201.140.126 attackbots
Hacking
2020-02-01 23:28:46
148.70.96.124 attackbots
Unauthorized connection attempt detected from IP address 148.70.96.124 to port 2220 [J]
2020-02-01 22:50:03
177.73.6.30 attack
DATE:2020-02-01 14:35:57, IP:177.73.6.30, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-02-01 23:10:26
93.174.95.110 attackspambots
Feb  1 15:50:58 debian-2gb-nbg1-2 kernel: \[2827914.830570\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=93.174.95.110 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=37103 PROTO=TCP SPT=47917 DPT=8035 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-01 23:01:11
213.184.254.128 attack
445/tcp 1433/tcp...
[2020-01-06/02-01]6pkt,2pt.(tcp)
2020-02-01 23:05:23
221.176.193.220 attack
55220/tcp 22122/tcp 5122/tcp...
[2019-12-09/2020-02-01]16pkt,6pt.(tcp)
2020-02-01 23:13:55
64.225.119.93 attackspam
3389BruteforceFW21
2020-02-01 23:22:33
49.254.32.42 attackbots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-01 23:07:57
148.70.91.15 attackspam
Unauthorized connection attempt detected from IP address 148.70.91.15 to port 2220 [J]
2020-02-01 22:52:26
185.175.93.17 attackbotsspam
02/01/2020-09:54:20.286596 185.175.93.17 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-02-01 22:58:42
112.166.225.147 attack
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-01 22:54:11
49.143.187.229 attackbots
Honeypot attack, port: 4567, PTR: PTR record not found
2020-02-01 23:13:14
222.84.254.139 attack
Feb  1 15:54:23 sd-53420 sshd\[12554\]: Invalid user tststs from 222.84.254.139
Feb  1 15:54:23 sd-53420 sshd\[12554\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.84.254.139
Feb  1 15:54:26 sd-53420 sshd\[12554\]: Failed password for invalid user tststs from 222.84.254.139 port 51468 ssh2
Feb  1 15:57:11 sd-53420 sshd\[12792\]: Invalid user 1 from 222.84.254.139
Feb  1 15:57:11 sd-53420 sshd\[12792\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.84.254.139
...
2020-02-01 23:20:09
148.70.210.77 attackspambots
Unauthorized connection attempt detected from IP address 148.70.210.77 to port 2220 [J]
2020-02-01 23:23:38

Recently Reported IPs

36.82.195.33 178.94.76.172 78.33.54.199 5.104.28.37
100.26.44.176 196.30.57.253 190.177.185.100 207.46.114.90
104.214.82.83 171.253.4.37 152.184.146.72 201.8.209.3
121.66.183.23 193.86.149.92 92.22.64.109 180.226.24.222
218.13.239.204 12.103.163.145 12.234.109.171 62.233.11.37