Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: Softbank BB Corp.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.118.146.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11224
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;126.118.146.149.		IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019053000 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 30 21:00:53 CST 2019
;; MSG SIZE  rcvd: 119

Host info
149.146.118.126.in-addr.arpa domain name pointer softbank126118146149.bbtec.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
149.146.118.126.in-addr.arpa	name = softbank126118146149.bbtec.net.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
117.103.168.204 attackspam
Too many connections or unauthorized access detected from Arctic banned ip
2020-05-27 18:27:02
79.124.62.250 attack
[H1.VM8] Blocked by UFW
2020-05-27 18:22:42
141.98.9.137 attackbotsspam
SSH login attempts.
2020-05-27 18:34:02
210.86.239.186 attack
$f2bV_matches
2020-05-27 18:11:51
116.2.14.187 attack
(ftpd) Failed FTP login from 116.2.14.187 (CN/China/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: May 27 08:19:06 ir1 pure-ftpd: (?@116.2.14.187) [WARNING] Authentication failed for user [anonymous]
2020-05-27 18:30:29
122.4.241.6 attackbots
Invalid user djr from 122.4.241.6 port 42078
2020-05-27 18:05:11
195.72.145.211 attack
Port probing on unauthorized port 23
2020-05-27 18:33:30
46.4.60.249 attack
20 attempts against mh-misbehave-ban on flame
2020-05-27 18:36:45
180.76.124.123 attack
SSH Brute Force
2020-05-27 17:59:27
162.243.135.242 attackspambots
Port Scan detected!
...
2020-05-27 18:08:04
192.119.67.62 attackbots
May 27 10:17:31 baguette sshd\[12109\]: Invalid user user from 192.119.67.62 port 55162
May 27 10:17:31 baguette sshd\[12109\]: Invalid user user from 192.119.67.62 port 55162
May 27 10:17:45 baguette sshd\[12111\]: Invalid user git from 192.119.67.62 port 47736
May 27 10:17:45 baguette sshd\[12111\]: Invalid user git from 192.119.67.62 port 47736
May 27 10:17:58 baguette sshd\[12113\]: Invalid user postgres from 192.119.67.62 port 39788
May 27 10:17:58 baguette sshd\[12113\]: Invalid user postgres from 192.119.67.62 port 39788
...
2020-05-27 18:23:53
202.171.77.87 attackspam
Dovecot Invalid User Login Attempt.
2020-05-27 18:01:30
74.82.47.55 attack
Port Scan detected!
...
2020-05-27 17:58:06
15.206.92.138 attackspambots
Bruteforce detected by fail2ban
2020-05-27 18:03:32
122.117.172.207 attack
Telnet Server BruteForce Attack
2020-05-27 18:24:50

Recently Reported IPs

125.43.169.23 183.27.6.254 55.7.183.234 31.105.240.116
64.177.182.229 87.76.236.165 36.68.236.195 214.224.2.113
165.22.198.182 161.3.77.202 1.8.180.113 138.197.46.208
178.167.178.44 88.80.125.136 70.192.91.2 135.240.236.210
73.160.22.131 54.163.111.75 104.140.103.39 212.220.221.75