Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: Softbank BB Corp.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.42.14.118
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7387
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;126.42.14.118.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019072800 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Jul 29 01:57:31 CST 2019
;; MSG SIZE  rcvd: 117
Host info
118.14.42.126.in-addr.arpa domain name pointer softbank126042014118.bbtec.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
118.14.42.126.in-addr.arpa	name = softbank126042014118.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
64.91.249.207 attack
trying to access non-authorized port
2020-06-10 17:42:17
46.161.27.75 attack
Port scan
2020-06-10 18:08:23
49.234.13.235 attack
2020-06-10 09:32:46,674 fail2ban.actions        [937]: NOTICE  [sshd] Ban 49.234.13.235
2020-06-10 10:05:46,188 fail2ban.actions        [937]: NOTICE  [sshd] Ban 49.234.13.235
2020-06-10 10:38:19,107 fail2ban.actions        [937]: NOTICE  [sshd] Ban 49.234.13.235
2020-06-10 11:10:12,822 fail2ban.actions        [937]: NOTICE  [sshd] Ban 49.234.13.235
2020-06-10 11:45:22,398 fail2ban.actions        [937]: NOTICE  [sshd] Ban 49.234.13.235
...
2020-06-10 17:46:12
191.7.158.65 attackspambots
Jun 10 11:05:05 legacy sshd[28282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.7.158.65
Jun 10 11:05:08 legacy sshd[28282]: Failed password for invalid user backup1 from 191.7.158.65 port 36566 ssh2
Jun 10 11:09:19 legacy sshd[28472]: Failed password for root from 191.7.158.65 port 38830 ssh2
...
2020-06-10 17:25:51
49.159.94.173 attack
Port Scan detected!
...
2020-06-10 18:04:25
200.73.128.148 attackspambots
Jun 10 05:50:39 ajax sshd[26965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.73.128.148 
Jun 10 05:50:41 ajax sshd[26965]: Failed password for invalid user monitor from 200.73.128.148 port 47884 ssh2
2020-06-10 17:47:38
103.214.129.204 attackspam
$f2bV_matches
2020-06-10 18:11:30
89.151.134.78 attackspambots
Jun 10 08:52:39 l02a sshd[1894]: Invalid user prueba from 89.151.134.78
Jun 10 08:52:39 l02a sshd[1894]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.151.134.78 
Jun 10 08:52:39 l02a sshd[1894]: Invalid user prueba from 89.151.134.78
Jun 10 08:52:41 l02a sshd[1894]: Failed password for invalid user prueba from 89.151.134.78 port 46618 ssh2
2020-06-10 17:48:42
106.12.192.91 attackbots
SSH/22 MH Probe, BF, Hack -
2020-06-10 17:45:51
144.172.79.8 attack
2020-06-09 UTC: (4x) - admin(2x),honey(2x)
2020-06-10 17:43:10
167.249.168.102 attack
frenzy
2020-06-10 17:38:27
45.227.255.149 attackbotsspam
20 attempts against mh_ha-misbehave-ban on light
2020-06-10 17:22:21
167.99.75.240 attack
Jun 10 06:13:38 vps647732 sshd[16002]: Failed password for root from 167.99.75.240 port 42276 ssh2
...
2020-06-10 17:58:13
137.117.178.120 attack
137.117.178.120 - - [10/Jun/2020:07:02:36 +0200] "POST /blog/xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; fr; rv:1.9.2.8) Gecko/20100722 Firefox/3.6.8"
137.117.178.120 - - [10/Jun/2020:07:02:36 +0200] "POST /xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/5.0 (Macintosh; U; Intel Mac OS X 10.6; fr; rv:1.9.2.8) Gecko/20100722 Firefox/3.6.8"
...
2020-06-10 17:40:38
106.39.15.168 attackbotsspam
Brute force attempt
2020-06-10 18:01:34

Recently Reported IPs

73.243.10.4 103.119.25.227 160.108.224.52 99.86.6.99
27.140.172.62 96.110.84.17 182.148.56.202 56.168.12.254
2a03:b0c0:3:d0::5902:8001 195.135.239.70 43.15.107.1 66.247.205.240
214.170.7.209 113.184.247.51 233.132.141.3 65.214.23.179
3.44.77.162 135.73.15.134 66.149.183.86 96.45.184.47