Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Adachi Ku

Region: Tokyo

Country: Japan

Internet Service Provider: NTT docomo

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 118.240.244.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22219
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;118.240.244.142.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 18:50:52 CST 2025
;; MSG SIZE  rcvd: 108
Host info
142.244.240.118.in-addr.arpa domain name pointer fp76f0f48e.tkyc313.ap.nuro.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.244.240.118.in-addr.arpa	name = fp76f0f48e.tkyc313.ap.nuro.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.170.231.123 attackbotsspam
failed_logins
2019-07-03 19:42:29
220.142.185.92 attack
37215/tcp
[2019-07-03]1pkt
2019-07-03 19:46:50
116.99.121.132 attackbotsspam
445/tcp
[2019-07-03]1pkt
2019-07-03 19:32:09
188.161.79.156 attack
abuse hack sip
2019-07-03 19:22:00
5.63.87.104 attack
Trying to deliver email spam, but blocked by RBL
2019-07-03 19:45:03
195.81.20.71 attackbotsspam
SMTP Fraud Orders
2019-07-03 19:44:13
138.197.156.202 attackspam
Jul  3 06:44:47 server2 sshd\[10038\]: User root from 138.197.156.202 not allowed because not listed in AllowUsers
Jul  3 06:44:48 server2 sshd\[10040\]: Invalid user admin from 138.197.156.202
Jul  3 06:44:49 server2 sshd\[10042\]: Invalid user admin from 138.197.156.202
Jul  3 06:44:49 server2 sshd\[10044\]: Invalid user user from 138.197.156.202
Jul  3 06:44:50 server2 sshd\[10046\]: Invalid user ubnt from 138.197.156.202
Jul  3 06:44:51 server2 sshd\[10048\]: Invalid user admin from 138.197.156.202
2019-07-03 19:13:29
185.153.196.191 attack
Multiport scan : 8 ports scanned 13159 14496 15916 16364 17169 18529 18602 19908
2019-07-03 19:23:02
180.249.180.85 attackspambots
445/tcp
[2019-07-03]1pkt
2019-07-03 18:59:17
195.206.105.217 attackspam
IP attempted unauthorised action
2019-07-03 19:27:48
128.199.118.27 attackbots
SSH Brute-Force reported by Fail2Ban
2019-07-03 19:33:25
220.90.129.103 attackspam
2019-07-03T12:17:06.173788cavecanem sshd[24629]: Invalid user zan from 220.90.129.103 port 42874
2019-07-03T12:17:06.177178cavecanem sshd[24629]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.90.129.103
2019-07-03T12:17:06.173788cavecanem sshd[24629]: Invalid user zan from 220.90.129.103 port 42874
2019-07-03T12:17:08.010447cavecanem sshd[24629]: Failed password for invalid user zan from 220.90.129.103 port 42874 ssh2
2019-07-03T12:19:45.948440cavecanem sshd[25285]: Invalid user aoyule from 220.90.129.103 port 38672
2019-07-03T12:19:45.950820cavecanem sshd[25285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.90.129.103
2019-07-03T12:19:45.948440cavecanem sshd[25285]: Invalid user aoyule from 220.90.129.103 port 38672
2019-07-03T12:19:48.280514cavecanem sshd[25285]: Failed password for invalid user aoyule from 220.90.129.103 port 38672 ssh2
2019-07-03T12:22:19.176831cavecanem sshd[25991]: Invali
...
2019-07-03 19:18:18
139.59.89.195 attackspam
Jul  3 09:53:54 vps65 sshd\[19212\]: Invalid user smkim from 139.59.89.195 port 39504
Jul  3 09:53:54 vps65 sshd\[19212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.89.195
...
2019-07-03 19:39:31
206.189.131.213 attackbotsspam
Fail2Ban Ban Triggered
2019-07-03 19:18:40
42.86.30.101 attack
Jul  3 07:54:52 srv206 sshd[27128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.86.30.101  user=root
Jul  3 07:54:53 srv206 sshd[27128]: Failed password for root from 42.86.30.101 port 40577 ssh2
Jul  3 07:54:55 srv206 sshd[27128]: Failed password for root from 42.86.30.101 port 40577 ssh2
Jul  3 07:54:52 srv206 sshd[27128]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.86.30.101  user=root
Jul  3 07:54:53 srv206 sshd[27128]: Failed password for root from 42.86.30.101 port 40577 ssh2
Jul  3 07:54:55 srv206 sshd[27128]: Failed password for root from 42.86.30.101 port 40577 ssh2
...
2019-07-03 19:38:23

Recently Reported IPs

244.101.158.73 127.132.147.92 147.198.176.250 174.57.18.175
70.241.213.19 225.15.116.61 198.149.77.57 249.183.78.60
128.120.123.22 162.92.142.35 8.135.226.59 173.244.68.62
155.8.94.116 3.156.69.244 7.208.39.59 141.180.185.60
123.166.110.63 120.30.111.150 44.19.14.230 221.219.30.198