Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.142.12.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.142.12.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021600 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 16 18:03:12 CST 2025
;; MSG SIZE  rcvd: 107
Host info
150.12.142.126.in-addr.arpa domain name pointer softbank126142012150.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
150.12.142.126.in-addr.arpa	name = softbank126142012150.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.93.200.50 attack
Invalid user test from 111.93.200.50 port 48633
2020-04-22 07:21:06
178.128.121.180 attackbotsspam
Apr 21 21:03:11 localhost sshd[76338]: Invalid user test from 178.128.121.180 port 45110
Apr 21 21:03:11 localhost sshd[76338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.180
Apr 21 21:03:11 localhost sshd[76338]: Invalid user test from 178.128.121.180 port 45110
Apr 21 21:03:13 localhost sshd[76338]: Failed password for invalid user test from 178.128.121.180 port 45110 ssh2
Apr 21 21:09:38 localhost sshd[76936]: Invalid user mr from 178.128.121.180 port 50352
...
2020-04-22 07:03:49
144.76.38.40 attackspambots
20 attempts against mh-misbehave-ban on storm
2020-04-22 06:58:37
45.148.10.211 attack
Attempted Brute Force (cpaneld)
2020-04-22 07:02:05
196.202.62.117 attack
Brute Force
2020-04-22 07:21:36
51.235.27.52 attack
Port probing on unauthorized port 2323
2020-04-22 07:09:23
104.248.92.124 attackspam
SSH Brute-Forcing (server1)
2020-04-22 06:55:29
51.75.254.172 attackspam
SSH Brute Force
2020-04-22 07:30:27
148.70.209.112 attackspam
Invalid user th from 148.70.209.112 port 55606
2020-04-22 07:14:48
186.101.233.134 attack
Apr 21 22:56:30 DAAP sshd[17806]: Invalid user git from 186.101.233.134 port 48718
Apr 21 22:56:30 DAAP sshd[17806]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.101.233.134
Apr 21 22:56:30 DAAP sshd[17806]: Invalid user git from 186.101.233.134 port 48718
Apr 21 22:56:32 DAAP sshd[17806]: Failed password for invalid user git from 186.101.233.134 port 48718 ssh2
Apr 21 23:01:31 DAAP sshd[17927]: Invalid user rj from 186.101.233.134 port 35878
...
2020-04-22 06:52:43
186.10.125.209 attackspambots
Apr 21 23:49:51 lukav-desktop sshd\[9536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209  user=root
Apr 21 23:49:53 lukav-desktop sshd\[9536\]: Failed password for root from 186.10.125.209 port 8413 ssh2
Apr 21 23:54:37 lukav-desktop sshd\[9728\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.10.125.209  user=root
Apr 21 23:54:40 lukav-desktop sshd\[9728\]: Failed password for root from 186.10.125.209 port 11265 ssh2
Apr 21 23:59:23 lukav-desktop sshd\[9925\]: Invalid user xh from 186.10.125.209
2020-04-22 06:59:59
173.53.23.48 attack
(sshd) Failed SSH login from 173.53.23.48 (US/United States/pool-173-53-23-48.rcmdva.fios.verizon.net): 5 in the last 3600 secs
2020-04-22 06:58:04
167.114.98.229 attackbotsspam
Invalid user admin from 167.114.98.229 port 57550
2020-04-22 06:55:04
37.43.29.35 attackbotsspam
srv01 Scanning Webserver Target(80 http) ..
2020-04-22 07:29:18
190.2.211.18 attackspambots
Fail2Ban Ban Triggered
2020-04-22 07:02:43

Recently Reported IPs

71.130.154.91 202.21.34.188 83.212.170.13 225.112.20.249
22.100.3.186 79.64.124.18 179.251.64.94 127.244.182.95
238.155.202.5 196.116.163.85 5.58.188.108 205.75.87.89
250.115.79.133 146.129.7.31 173.129.9.153 231.195.46.240
63.254.155.44 85.83.252.55 87.151.165.64 244.70.29.101