Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.75.20.159
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.75.20.159.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012102 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 11:53:50 CST 2025
;; MSG SIZE  rcvd: 106
Host info
159.20.75.126.in-addr.arpa domain name pointer softbank126075020159.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
159.20.75.126.in-addr.arpa	name = softbank126075020159.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
18.18.248.17 attack
Automatic report - Banned IP Access
2019-10-18 21:03:57
179.125.139.87 attack
Automatic report - Port Scan Attack
2019-10-18 20:52:41
148.66.134.46 attackspambots
Automatic report - Banned IP Access
2019-10-18 21:25:53
5.196.217.177 attack
Oct 18 14:18:18 mail postfix/smtpd\[352\]: warning: unknown\[5.196.217.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 18 15:01:51 mail postfix/smtpd\[1664\]: warning: unknown\[5.196.217.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 18 15:10:51 mail postfix/smtpd\[1568\]: warning: unknown\[5.196.217.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Oct 18 15:23:25 mail postfix/smtpd\[2147\]: warning: unknown\[5.196.217.177\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2019-10-18 21:24:14
185.232.67.8 attackspam
Oct 18 15:01:24 dedicated sshd[11597]: Invalid user admin from 185.232.67.8 port 45840
2019-10-18 21:26:47
41.190.34.122 attackbots
" "
2019-10-18 21:04:21
102.115.230.106 attackspambots
LGS,WP GET /wp-login.php
2019-10-18 21:07:10
138.186.1.26 attackspam
Oct 18 14:50:24 markkoudstaal sshd[32129]: Failed password for root from 138.186.1.26 port 59158 ssh2
Oct 18 14:54:57 markkoudstaal sshd[32574]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.186.1.26
Oct 18 14:54:59 markkoudstaal sshd[32574]: Failed password for invalid user kadri from 138.186.1.26 port 42739 ssh2
2019-10-18 21:11:35
51.255.173.245 attackspam
2019-10-18T13:07:44.322406hub.schaetter.us sshd\[12963\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=245.ip-51-255-173.eu  user=root
2019-10-18T13:07:46.179809hub.schaetter.us sshd\[12963\]: Failed password for root from 51.255.173.245 port 55106 ssh2
2019-10-18T13:16:59.481155hub.schaetter.us sshd\[13079\]: Invalid user com from 51.255.173.245 port 38802
2019-10-18T13:16:59.490028hub.schaetter.us sshd\[13079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=245.ip-51-255-173.eu
2019-10-18T13:17:02.075272hub.schaetter.us sshd\[13079\]: Failed password for invalid user com from 51.255.173.245 port 38802 ssh2
...
2019-10-18 21:24:02
212.42.104.101 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/212.42.104.101/ 
 KG - 1H : (2)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : KG 
 NAME ASN : ASN8449 
 
 IP : 212.42.104.101 
 
 CIDR : 212.42.104.0/24 
 
 PREFIX COUNT : 65 
 
 UNIQUE IP COUNT : 17408 
 
 
 WYKRYTE ATAKI Z ASN8449 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-18 14:17:38 
 
 INFO : Port MAX SCAN Scan Detected and Blocked by ADMIN  - data recovery
2019-10-18 20:56:36
157.230.57.112 attackspam
Portscan or hack attempt detected by psad/fwsnort
2019-10-18 21:14:27
51.15.57.248 attack
$f2bV_matches
2019-10-18 21:22:50
92.222.77.175 attackspambots
Oct 18 02:07:13 eddieflores sshd\[31042\]: Invalid user tester from 92.222.77.175
Oct 18 02:07:13 eddieflores sshd\[31042\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.ip-92-222-77.eu
Oct 18 02:07:15 eddieflores sshd\[31042\]: Failed password for invalid user tester from 92.222.77.175 port 33804 ssh2
Oct 18 02:10:37 eddieflores sshd\[31385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.ip-92-222-77.eu  user=root
Oct 18 02:10:39 eddieflores sshd\[31385\]: Failed password for root from 92.222.77.175 port 43264 ssh2
2019-10-18 21:27:18
109.120.159.17 attackbotsspam
Oct 18 13:25:51 dev0-dcde-rnet sshd[21634]: Failed password for root from 109.120.159.17 port 49108 ssh2
Oct 18 13:43:50 dev0-dcde-rnet sshd[21680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.120.159.17
Oct 18 13:43:52 dev0-dcde-rnet sshd[21680]: Failed password for invalid user weblogic from 109.120.159.17 port 55140 ssh2
2019-10-18 21:00:36
203.91.116.154 attackspam
203.91.116.154 - - [18/Oct/2019:07:43:18 -0400] "GET /?page=products&action=../../../../etc/passwd&manufacturerID=61&productID=4701-RIM&linkID=16812 HTTP/1.1" 200 17416 "https://exitdevice.com/?page=products&action=../../../../etc/passwd&manufacturerID=61&productID=4701-RIM&linkID=16812" "Mozilla/5.0 (Windows NT 10.0; WOW64; Rv:50.0) Gecko/20100101 Firefox/50.0"
...
2019-10-18 21:20:45

Recently Reported IPs

179.165.250.251 40.25.112.181 86.103.244.176 93.182.187.181
45.197.59.102 81.27.213.140 173.250.128.104 3.228.242.56
113.71.155.35 52.216.91.15 146.81.28.51 215.63.189.73
52.215.219.228 197.180.82.82 215.133.102.102 87.78.157.182
191.182.106.81 97.68.153.224 66.112.153.113 193.137.54.122