Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Paju

Region: Gyeonggi-do

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 120.142.225.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;120.142.225.207.		IN	A

;; AUTHORITY SECTION:
.			299	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112701 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 28 03:41:45 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 207.225.142.120.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 207.225.142.120.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
147.135.133.88 attack
*Port Scan* detected from 147.135.133.88 (FR/France/Hauts-de-France/Gravelines/ip-147-135-133.eu). 4 hits in the last 40 seconds
2020-08-09 13:06:33
212.64.8.10 attack
Aug  9 05:59:16 gospond sshd[5753]: Failed password for root from 212.64.8.10 port 48596 ssh2
Aug  9 05:59:14 gospond sshd[5753]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.8.10  user=root
Aug  9 05:59:16 gospond sshd[5753]: Failed password for root from 212.64.8.10 port 48596 ssh2
...
2020-08-09 13:36:27
79.137.116.226 attackbots
Port scan: Attack repeated for 24 hours
2020-08-09 13:00:16
122.162.206.109 attackbots
Aug  9 05:20:55 sip sshd[5657]: Failed password for root from 122.162.206.109 port 57802 ssh2
Aug  9 06:01:28 sip sshd[16591]: Failed password for root from 122.162.206.109 port 42260 ssh2
2020-08-09 13:26:05
81.12.155.170 attack
20/8/8@23:54:42: FAIL: Alarm-Intrusion address from=81.12.155.170
...
2020-08-09 13:28:38
196.188.243.246 attackspam
1596945286 - 08/09/2020 05:54:46 Host: 196.188.243.246/196.188.243.246 Port: 445 TCP Blocked
2020-08-09 13:23:31
94.25.181.46 attack
failed_logins
2020-08-09 13:35:52
220.166.42.139 attackspam
2020-08-09T05:54:12.091979+02:00  sshd[30398]: Failed password for root from 220.166.42.139 port 48886 ssh2
2020-08-09 13:06:59
212.64.17.102 attackspam
$f2bV_matches
2020-08-09 13:15:53
49.233.153.71 attack
$f2bV_matches
2020-08-09 13:01:59
5.196.94.68 attackspam
2020-08-09T05:41:31.916329vps773228.ovh.net sshd[6803]: Failed password for root from 5.196.94.68 port 51878 ssh2
2020-08-09T05:48:19.999761vps773228.ovh.net sshd[6843]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns377894.ip-5-196-94.eu  user=root
2020-08-09T05:48:21.512964vps773228.ovh.net sshd[6843]: Failed password for root from 5.196.94.68 port 35372 ssh2
2020-08-09T05:55:05.329953vps773228.ovh.net sshd[6895]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns377894.ip-5-196-94.eu  user=root
2020-08-09T05:55:07.580308vps773228.ovh.net sshd[6895]: Failed password for root from 5.196.94.68 port 47114 ssh2
...
2020-08-09 13:02:52
218.92.0.251 attack
Aug  9 07:12:06 db sshd[21901]: User root from 218.92.0.251 not allowed because none of user's groups are listed in AllowGroups
...
2020-08-09 13:14:52
106.51.78.18 attack
Aug  8 18:47:22 eddieflores sshd\[29130\]: Invalid user 1!2@3\#4\$5%6\^ from 106.51.78.18
Aug  8 18:47:22 eddieflores sshd\[29130\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.78.18
Aug  8 18:47:24 eddieflores sshd\[29130\]: Failed password for invalid user 1!2@3\#4\$5%6\^ from 106.51.78.18 port 35002 ssh2
Aug  8 18:51:43 eddieflores sshd\[29403\]: Invalid user 987456321a from 106.51.78.18
Aug  8 18:51:43 eddieflores sshd\[29403\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.78.18
2020-08-09 13:06:44
68.183.100.153 attack
Aug  8 19:00:20 hpm sshd\[7829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.100.153  user=root
Aug  8 19:00:22 hpm sshd\[7829\]: Failed password for root from 68.183.100.153 port 59366 ssh2
Aug  8 19:03:14 hpm sshd\[8053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.100.153  user=root
Aug  8 19:03:16 hpm sshd\[8053\]: Failed password for root from 68.183.100.153 port 50244 ssh2
Aug  8 19:06:06 hpm sshd\[8282\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.100.153  user=root
2020-08-09 13:17:10
58.87.76.77 attack
Aug  9 07:20:03 cosmoit sshd[26071]: Failed password for root from 58.87.76.77 port 38552 ssh2
2020-08-09 13:32:43

Recently Reported IPs

196.45.49.11 98.31.2.241 216.255.218.52 160.248.35.136
189.103.255.233 181.57.88.65 56.49.189.36 222.90.215.213
39.76.173.219 94.153.212.65 124.183.231.86 115.103.142.169
114.116.182.254 196.194.76.234 189.30.121.194 195.146.223.48
186.233.122.1 165.52.230.89 148.233.68.194 12.247.35.206