Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Karasawa

Region: Kanagawa

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 124.212.63.142
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32616
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;124.212.63.142.			IN	A

;; AUTHORITY SECTION:
.			550	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022010801 1800 900 604800 86400

;; Query time: 63 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 09 08:11:37 CST 2022
;; MSG SIZE  rcvd: 107
Host info
142.63.212.124.in-addr.arpa domain name pointer KD124212063142.ppp-bb.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
142.63.212.124.in-addr.arpa	name = KD124212063142.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
140.143.88.129 attackspam
Invalid user desop from 140.143.88.129 port 43382
2020-05-29 02:54:22
101.91.219.207 attackbotsspam
Repeated brute force against a port
2020-05-29 03:29:39
94.182.191.194 attack
Invalid user pandora from 94.182.191.194 port 44948
2020-05-29 03:03:37
182.254.161.202 attack
k+ssh-bruteforce
2020-05-29 03:16:21
103.120.117.107 attackspambots
Invalid user admin from 103.120.117.107 port 54717
2020-05-29 03:29:10
49.232.51.237 attack
Invalid user tgallen from 49.232.51.237 port 51048
2020-05-29 03:07:28
46.101.232.76 attack
SSH Brute Force
2020-05-29 03:07:45
104.248.182.179 attackspambots
$f2bV_matches
2020-05-29 03:02:32
2.139.174.205 attack
bruteforce detected
2020-05-29 03:10:25
111.229.49.165 attack
May 28 20:02:57 roki sshd[14642]: Invalid user alan from 111.229.49.165
May 28 20:02:57 roki sshd[14642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.49.165
May 28 20:02:59 roki sshd[14642]: Failed password for invalid user alan from 111.229.49.165 port 54270 ssh2
May 28 20:09:59 roki sshd[15144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.49.165  user=root
May 28 20:10:01 roki sshd[15144]: Failed password for root from 111.229.49.165 port 60578 ssh2
...
2020-05-29 03:00:00
211.144.69.249 attack
May 28 18:37:25 ip-172-31-62-245 sshd\[28878\]: Failed password for root from 211.144.69.249 port 25309 ssh2\
May 28 18:39:45 ip-172-31-62-245 sshd\[29004\]: Failed password for root from 211.144.69.249 port 44289 ssh2\
May 28 18:42:05 ip-172-31-62-245 sshd\[29042\]: Failed password for root from 211.144.69.249 port 57753 ssh2\
May 28 18:44:22 ip-172-31-62-245 sshd\[29074\]: Invalid user gabi from 211.144.69.249\
May 28 18:44:24 ip-172-31-62-245 sshd\[29074\]: Failed password for invalid user gabi from 211.144.69.249 port 55358 ssh2\
2020-05-29 03:12:17
138.68.176.38 attackspam
(sshd) Failed SSH login from 138.68.176.38 (GB/United Kingdom/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 28 20:45:54 ubnt-55d23 sshd[16154]: Invalid user ben from 138.68.176.38 port 47886
May 28 20:45:57 ubnt-55d23 sshd[16154]: Failed password for invalid user ben from 138.68.176.38 port 47886 ssh2
2020-05-29 03:21:33
51.79.68.147 attackbotsspam
2020-05-28T17:23:50.043313mail.broermann.family sshd[1120]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.ip-51-79-68.net  user=root
2020-05-28T17:23:52.776534mail.broermann.family sshd[1120]: Failed password for root from 51.79.68.147 port 38588 ssh2
2020-05-28T17:27:38.175896mail.broermann.family sshd[1315]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.ip-51-79-68.net  user=root
2020-05-28T17:27:40.541843mail.broermann.family sshd[1315]: Failed password for root from 51.79.68.147 port 44930 ssh2
2020-05-28T17:31:22.194713mail.broermann.family sshd[1538]: Invalid user scanner from 51.79.68.147 port 51300
...
2020-05-29 03:06:27
14.116.255.229 attackbots
Invalid user svn from 14.116.255.229 port 34454
2020-05-29 03:09:15
221.217.227.86 attackspam
Invalid user gitlab from 221.217.227.86 port 44449
2020-05-29 03:11:01

Recently Reported IPs

153.155.62.2 223.233.103.56 178.40.132.164 157.31.20.206
109.41.182.189 226.162.23.48 176.83.142.185 188.75.82.136
236.9.227.143 82.145.106.154 18.139.69.247 43.58.1.241
255.237.204.151 238.122.31.89 146.115.43.48 165.94.179.188
199.6.99.218 171.54.66.61 106.252.56.164 184.160.87.142