Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.235.48.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2768
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.235.48.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 00:15:05 CST 2025
;; MSG SIZE  rcvd: 107
Host info
242.48.235.126.in-addr.arpa domain name pointer softbank126235048242.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.48.235.126.in-addr.arpa	name = softbank126235048242.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
180.215.80.2 attackspam
Scanning and Vuln Attempts
2019-10-15 17:36:15
106.12.13.138 attack
2019-10-15T05:25:21.679564abusebot-4.cloudsearch.cf sshd\[27546\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.13.138  user=root
2019-10-15 17:40:28
180.76.58.76 attackspambots
Oct 15 10:24:16 MK-Soft-VM7 sshd[29593]: Failed password for root from 180.76.58.76 port 44608 ssh2
...
2019-10-15 17:17:59
180.66.34.140 attackspam
2019-10-15T08:56:46.867907abusebot-5.cloudsearch.cf sshd\[3241\]: Invalid user bjorn from 180.66.34.140 port 48124
2019-10-15 17:23:28
185.173.104.159 attackspam
Scanning and Vuln Attempts
2019-10-15 17:14:49
14.18.32.156 attack
Oct 15 10:27:12 dcd-gentoo sshd[26833]: User root from 14.18.32.156 not allowed because none of user's groups are listed in AllowGroups
Oct 15 10:27:15 dcd-gentoo sshd[26833]: error: PAM: Authentication failure for illegal user root from 14.18.32.156
Oct 15 10:27:12 dcd-gentoo sshd[26833]: User root from 14.18.32.156 not allowed because none of user's groups are listed in AllowGroups
Oct 15 10:27:15 dcd-gentoo sshd[26833]: error: PAM: Authentication failure for illegal user root from 14.18.32.156
Oct 15 10:27:12 dcd-gentoo sshd[26833]: User root from 14.18.32.156 not allowed because none of user's groups are listed in AllowGroups
Oct 15 10:27:15 dcd-gentoo sshd[26833]: error: PAM: Authentication failure for illegal user root from 14.18.32.156
Oct 15 10:27:15 dcd-gentoo sshd[26833]: Failed keyboard-interactive/pam for invalid user root from 14.18.32.156 port 45633 ssh2
...
2019-10-15 17:45:34
34.221.44.101 attack
by Amazon Technologies Inc.
2019-10-15 17:45:14
183.87.149.54 attackbots
Scanning and Vuln Attempts
2019-10-15 17:24:31
51.77.140.48 attackbots
Oct 15 06:14:18 *** sshd[8288]: Failed password for r.r from 51.77.140.48 port 50856 ssh2
Oct 15 06:31:45 *** sshd[10185]: Invalid user sui from 51.77.140.48
Oct 15 06:31:46 *** sshd[10185]: Failed password for invalid user sui from 51.77.140.48 port 51064 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.77.140.48
2019-10-15 17:49:55
81.22.45.65 attack
2019-10-15T11:42:37.543870+02:00 lumpi kernel: [954967.716588] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=81.22.45.65 DST=172.31.1.100 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=40922 PROTO=TCP SPT=48763 DPT=9954 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-10-15 17:43:15
178.210.139.248 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/178.210.139.248/ 
 UA - 1H : (51)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : UA 
 NAME ASN : ASN49984 
 
 IP : 178.210.139.248 
 
 CIDR : 178.210.128.0/19 
 
 PREFIX COUNT : 3 
 
 UNIQUE IP COUNT : 11264 
 
 
 WYKRYTE ATAKI Z ASN49984 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-15 05:46:27 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-15 17:40:11
92.222.181.159 attackspam
ssh failed login
2019-10-15 17:22:22
45.227.253.138 attackbots
Oct 15 09:00:26 heicom postfix/smtpd\[10303\]: warning: unknown\[45.227.253.138\]: SASL LOGIN authentication failed: authentication failure
Oct 15 09:15:14 heicom postfix/smtpd\[10667\]: warning: unknown\[45.227.253.138\]: SASL LOGIN authentication failed: authentication failure
Oct 15 09:15:16 heicom postfix/smtpd\[10667\]: warning: unknown\[45.227.253.138\]: SASL LOGIN authentication failed: authentication failure
Oct 15 09:18:09 heicom postfix/smtpd\[13093\]: warning: unknown\[45.227.253.138\]: SASL LOGIN authentication failed: authentication failure
Oct 15 09:18:11 heicom postfix/smtpd\[10667\]: warning: unknown\[45.227.253.138\]: SASL LOGIN authentication failed: authentication failure
...
2019-10-15 17:21:57
165.227.123.226 attackbots
Oct 14 14:43:48 toyboy sshd[24742]: Invalid user kkyin from 165.227.123.226
Oct 14 14:43:48 toyboy sshd[24742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.123.226
Oct 14 14:43:50 toyboy sshd[24742]: Failed password for invalid user kkyin from 165.227.123.226 port 44226 ssh2
Oct 14 14:43:50 toyboy sshd[24742]: Received disconnect from 165.227.123.226: 11: Bye Bye [preauth]
Oct 14 14:54:21 toyboy sshd[25534]: Invalid user hko from 165.227.123.226
Oct 14 14:54:21 toyboy sshd[25534]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.123.226
Oct 14 14:54:23 toyboy sshd[25534]: Failed password for invalid user hko from 165.227.123.226 port 37142 ssh2
Oct 14 14:54:23 toyboy sshd[25534]: Received disconnect from 165.227.123.226: 11: Bye Bye [preauth]
Oct 14 14:58:14 toyboy sshd[25765]: Invalid user edwin from 165.227.123.226
Oct 14 14:58:14 toyboy sshd[25765]: pam_unix(sshd:auth):........
-------------------------------
2019-10-15 17:18:50
2.36.67.194 attackbots
Automatic report - Banned IP Access
2019-10-15 17:41:37

Recently Reported IPs

199.59.59.46 123.29.244.63 67.37.132.120 238.50.225.103
229.228.185.173 149.223.187.235 63.95.217.173 16.136.237.248
246.154.89.169 194.248.93.93 53.193.115.235 91.168.254.111
192.210.127.111 213.109.176.139 89.91.105.235 59.106.221.99
156.249.95.41 181.58.60.197 241.86.96.112 52.38.194.216