Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.141.49.138
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44653
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.141.49.138.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121600 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 16 14:24:39 CST 2025
;; MSG SIZE  rcvd: 107
Host info
138.49.141.126.in-addr.arpa domain name pointer softbank126141049138.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
138.49.141.126.in-addr.arpa	name = softbank126141049138.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
202.138.242.121 attackspam
$f2bV_matches
2019-08-14 18:07:42
95.105.233.209 attackspambots
detected by Fail2Ban
2019-08-14 18:28:44
185.9.19.160 attackbots
" "
2019-08-14 18:50:01
167.114.3.44 attack
[portscan] Port scan
2019-08-14 18:00:59
35.194.198.18 attack
2019-08-14T10:21:41.177797abusebot-6.cloudsearch.cf sshd\[22621\]: Invalid user kirk from 35.194.198.18 port 56416
2019-08-14 18:49:25
107.173.233.15 attackbots
Aug 14 06:15:14 vps200512 sshd\[24817\]: Invalid user admin from 107.173.233.15
Aug 14 06:15:14 vps200512 sshd\[24817\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.233.15
Aug 14 06:15:15 vps200512 sshd\[24817\]: Failed password for invalid user admin from 107.173.233.15 port 59492 ssh2
Aug 14 06:20:24 vps200512 sshd\[24981\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=107.173.233.15  user=root
Aug 14 06:20:27 vps200512 sshd\[24981\]: Failed password for root from 107.173.233.15 port 50094 ssh2
2019-08-14 18:26:46
36.90.109.135 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2019-08-14 18:55:24
94.23.212.137 attackspambots
$f2bV_matches
2019-08-14 18:09:13
165.22.101.199 attack
2019-08-14T04:35:51.992232abusebot-8.cloudsearch.cf sshd\[7036\]: Invalid user cxh from 165.22.101.199 port 37588
2019-08-14 18:50:44
45.40.134.20 attack
xmlrpc attack
2019-08-14 18:04:17
188.19.177.249 attack
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-14 18:38:27
186.212.77.211 attack
2019-08-13T03:51:42.266858ks3373544 sshd[4591]: Invalid user srvadmin from 186.212.77.211 port 1027
2019-08-13T03:51:42.298389ks3373544 sshd[4591]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.212.77.211
2019-08-13T03:51:45.001822ks3373544 sshd[4591]: Failed password for invalid user srvadmin from 186.212.77.211 port 1027 ssh2
2019-08-13T03:59:14.188035ks3373544 sshd[5239]: Invalid user sylee from 186.212.77.211 port 40174
2019-08-13T03:59:14.223863ks3373544 sshd[5239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.212.77.211

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=186.212.77.211
2019-08-14 18:52:22
120.0.109.247 attackbots
Unauthorised access (Aug 14) SRC=120.0.109.247 LEN=40 TTL=49 ID=40631 TCP DPT=8080 WINDOW=47497 SYN 
Unauthorised access (Aug 14) SRC=120.0.109.247 LEN=40 TTL=49 ID=41235 TCP DPT=8080 WINDOW=47497 SYN 
Unauthorised access (Aug 11) SRC=120.0.109.247 LEN=40 TTL=49 ID=2535 TCP DPT=8080 WINDOW=47497 SYN 
Unauthorised access (Aug 11) SRC=120.0.109.247 LEN=40 TTL=49 ID=43838 TCP DPT=8080 WINDOW=47497 SYN
2019-08-14 18:31:11
98.162.25.7 attackbots
NAME : "" "" CIDR :  | STATUS : 403 {Looking for resource vulnerabilities} DDoS Attack  - block certain countries :) IP: 98.162.25.7  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-14 18:02:43
177.35.123.54 attackspambots
Aug 14 09:04:47 ks10 sshd[29167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.35.123.54 
Aug 14 09:04:49 ks10 sshd[29167]: Failed password for invalid user yoko from 177.35.123.54 port 39956 ssh2
...
2019-08-14 18:08:16

Recently Reported IPs

228.37.222.121 158.68.165.133 44.99.186.171 9.103.214.54
53.214.63.69 96.4.127.231 243.231.41.225 75.114.182.111
191.140.121.12 97.101.154.77 187.226.216.86 170.90.116.206
133.214.101.69 58.89.79.148 92.170.202.188 158.175.193.80
37.165.221.191 202.152.168.213 132.149.219.149 215.246.170.25