Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.21.142.36
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22688
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.21.142.36.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 07:43:15 CST 2022
;; MSG SIZE  rcvd: 106
Host info
36.142.21.118.in-addr.arpa domain name pointer i118-21-142-36.s30.a048.ap.plala.or.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
36.142.21.118.in-addr.arpa	name = i118-21-142-36.s30.a048.ap.plala.or.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.26 attack
firewall-block, port(s): 2781/tcp
2019-10-27 07:36:53
148.251.20.143 attackbotsspam
ET SCAN Potential SSH Scan - port: 22 proto: TCP cat: Attempted Information Leak
2019-10-27 08:08:13
89.248.174.215 attackbots
10/26/2019-18:57:30.287720 89.248.174.215 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 98
2019-10-27 07:47:23
171.217.95.130 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:40:07
66.240.236.119 attackbots
Multiport scan : 4 ports scanned 5222 8334 9000 9042
2019-10-27 07:52:04
45.227.254.30 attackspambots
firewall-block, port(s): 2869/tcp
2019-10-27 07:54:58
185.156.73.14 attackbotsspam
Multiport scan : 26 ports scanned 8320 8321 8322 9031 9032 9033 19862 19863 28429 28430 28431 40048 40049 40050 40813 40814 40815 54460 54461 54462 58297 58298 58299 64093 64094 64095
2019-10-27 08:03:34
185.175.93.105 attackbotsspam
10/27/2019-00:39:26.616751 185.175.93.105 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 07:37:26
45.136.109.82 attackbots
10/26/2019-19:15:13.223519 45.136.109.82 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-27 07:55:56
183.233.197.42 attackbotsspam
10/27/2019-01:19:32.852746 183.233.197.42 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-10-27 08:04:55
111.61.81.13 attack
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 08:11:26
80.82.64.127 attackspambots
10/26/2019-18:40:28.840822 80.82.64.127 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-27 07:50:05
106.39.84.154 attackbotsspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:42:12
185.209.0.89 attack
10/27/2019-01:11:46.084669 185.209.0.89 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-27 08:01:02
190.75.7.223 attackspambots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2019-10-27 07:33:32

Recently Reported IPs

182.90.200.64 36.225.254.110 190.120.62.158 178.89.52.66
187.19.121.112 78.39.38.182 39.187.212.223 49.7.58.253
62.228.87.27 108.226.85.216 108.88.112.96 122.236.208.183
179.171.92.107 82.81.134.133 105.213.121.246 103.171.44.159
211.143.128.28 123.195.32.195 187.202.229.59 87.249.25.147