Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Minaminakamaru

Region: Saitama

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.242.140.46
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23087
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.242.140.46.			IN	A

;; AUTHORITY SECTION:
.			492	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102900 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 29 16:14:47 CST 2022
;; MSG SIZE  rcvd: 107
Host info
46.140.242.126.in-addr.arpa domain name pointer softbank126242140046.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
46.140.242.126.in-addr.arpa	name = softbank126242140046.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
92.188.134.54 attackbots
Sep  4 18:49:14 mellenthin postfix/smtpd[30941]: NOQUEUE: reject: RCPT from unknown[92.188.134.54]: 554 5.7.1 Service unavailable; Client host [92.188.134.54] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/92.188.134.54; from= to= proto=ESMTP helo=<54.134.188.92.dynamic.ftth.abo.nordnet.fr>
2020-09-05 08:28:36
46.99.133.165 attackbotsspam
Icarus honeypot on github
2020-09-05 08:40:21
112.26.98.122 attackbots
firewall-block, port(s): 18287/tcp
2020-09-05 08:45:41
181.215.204.157 attackspam
Automatic report - Banned IP Access
2020-09-05 08:27:59
94.25.165.73 attackbots
Honeypot attack, port: 445, PTR: client.yota.ru.
2020-09-05 08:52:28
27.155.41.8 attackbots
Automatic report - Port Scan Attack
2020-09-05 08:48:20
190.37.233.232 attack
Honeypot attack, port: 445, PTR: 190-37-233-232.dyn.dsl.cantv.net.
2020-09-05 08:33:49
79.141.175.115 attackspam
Spam
2020-09-05 08:39:22
45.129.33.4 attack
Port-scan: detected 101 distinct ports within a 24-hour window.
2020-09-05 08:31:40
51.75.195.80 attack
51.75.195.80 - - [04/Sep/2020:18:48:48 +0200] "POST /wp-login.php HTTP/1.0" 200 4792 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-05 08:49:25
103.122.229.1 attackbotsspam
103.122.229.1 - - [04/Sep/2020:12:49:30 -0400] "POST /xmlrpc.php HTTP/1.1" 404 208 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36"
103.122.229.1 - - [04/Sep/2020:12:49:32 -0400] "POST /wordpress/xmlrpc.php HTTP/1.1" 404 218 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36"
103.122.229.1 - - [04/Sep/2020:12:49:33 -0400] "POST /blog/xmlrpc.php HTTP/1.1" 404 213 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/41.0.2227.0 Safari/537.36"
...
2020-09-05 08:14:12
142.0.162.24 attackspam
Spam
2020-09-05 08:43:39
176.65.241.165 attackspam
Honeypot attack, port: 445, PTR: mail.omanfuel.com.
2020-09-05 08:18:22
176.37.248.76 attackbotsspam
Unauthorized connection attempt from IP address 176.37.248.76 on port 993
2020-09-05 08:33:11
103.59.113.193 attackbots
Sep  4 18:36:32 ns3164893 sshd[4163]: Failed password for root from 103.59.113.193 port 60676 ssh2
Sep  4 18:49:28 ns3164893 sshd[5058]: Invalid user test1 from 103.59.113.193 port 59876
...
2020-09-05 08:19:04

Recently Reported IPs

143.131.162.166 188.250.200.250 127.47.15.224 138.235.146.234
90.226.232.109 183.145.93.129 96.246.34.158 44.61.10.211
43.64.21.242 226.31.54.193 116.85.64.228 238.54.186.217
56.168.215.30 71.12.50.141 223.176.146.246 111.118.21.78
120.186.116.66 213.123.237.46 179.117.39.40 149.72.164.126