Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Miyagi

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.102.194.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35472
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.102.194.245.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:58:34 CST 2025
;; MSG SIZE  rcvd: 108
Host info
245.194.102.126.in-addr.arpa domain name pointer softbank126102194245.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
245.194.102.126.in-addr.arpa	name = softbank126102194245.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
129.78.110.128 attackspam
GET / HTTP/1.1 403 0 "-" "Mozilla/5.0 zgrab/0.x"
2020-09-05 19:11:30
181.66.195.106 attack
Sep  4 18:45:43 mellenthin postfix/smtpd[32154]: NOQUEUE: reject: RCPT from unknown[181.66.195.106]: 554 5.7.1 Service unavailable; Client host [181.66.195.106] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/181.66.195.106; from= to= proto=ESMTP helo=<[181.66.195.106]>
2020-09-05 19:04:05
181.118.66.173 attack
Unauthorized connection attempt from IP address 181.118.66.173 on Port 445(SMB)
2020-09-05 19:07:54
20.41.86.104 attackbotsspam
Port Scan: TCP/443
2020-09-05 18:31:31
190.206.164.64 attackbotsspam
Attempted connection to port 445.
2020-09-05 18:33:54
181.191.223.163 attackbotsspam
1599237950 - 09/04/2020 18:45:50 Host: 181.191.223.163/181.191.223.163 Port: 445 TCP Blocked
2020-09-05 18:56:06
193.0.151.10 attack
Attempted connection to port 445.
2020-09-05 18:33:31
203.87.133.178 attackbotsspam
Attempted connection to port 445.
2020-09-05 19:13:46
118.24.149.248 attackspam
Invalid user imprime from 118.24.149.248 port 48428
2020-09-05 19:22:32
117.102.76.182 attackspam
Sep  5 10:23:45 scw-6657dc sshd[20260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.76.182  user=root
Sep  5 10:23:45 scw-6657dc sshd[20260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.102.76.182  user=root
Sep  5 10:23:47 scw-6657dc sshd[20260]: Failed password for root from 117.102.76.182 port 38968 ssh2
...
2020-09-05 19:17:08
41.111.135.199 attack
Sep  5 11:20:07 gw1 sshd[10485]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=41.111.135.199
Sep  5 11:20:09 gw1 sshd[10485]: Failed password for invalid user service from 41.111.135.199 port 45926 ssh2
...
2020-09-05 19:03:26
5.160.243.153 attackspam
$f2bV_matches
2020-09-05 19:05:31
156.206.182.193 attack
Attempted connection to port 23.
2020-09-05 19:20:18
112.85.42.227 attackspambots
Sep  5 07:11:15 NPSTNNYC01T sshd[19125]: Failed password for root from 112.85.42.227 port 51602 ssh2
Sep  5 07:12:06 NPSTNNYC01T sshd[19203]: Failed password for root from 112.85.42.227 port 60950 ssh2
...
2020-09-05 19:21:24
178.205.253.206 attackspam
 TCP (SYN) 178.205.253.206:55414 -> port 1433, len 44
2020-09-05 19:18:58

Recently Reported IPs

228.219.9.224 181.98.45.97 169.204.188.207 32.243.162.80
137.3.137.129 49.69.235.127 97.246.23.222 94.108.59.112
139.246.90.69 138.253.173.215 144.30.61.53 118.157.234.44
165.154.74.4 33.89.243.148 170.224.206.77 70.187.68.208
68.106.148.161 98.126.93.172 242.168.91.163 139.178.226.151