Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Hukuoka (Fukuoka)

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.85.133.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32006
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.85.133.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 15:50:23 CST 2025
;; MSG SIZE  rcvd: 107
Host info
194.133.85.126.in-addr.arpa domain name pointer softbank126085133194.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
194.133.85.126.in-addr.arpa	name = softbank126085133194.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
40.71.45.55 attackbots
Unauthorized connection attempt detected from IP address 40.71.45.55 to port 465
2020-06-01 01:01:57
222.186.30.76 attack
May 31 19:02:53 [host] sshd[1143]: pam_unix(sshd:a
May 31 19:02:55 [host] sshd[1143]: Failed password
May 31 19:02:57 [host] sshd[1143]: Failed password
2020-06-01 01:04:57
93.144.228.113 attackbotsspam
Unauthorized connection attempt detected from IP address 93.144.228.113 to port 8080
2020-06-01 00:48:57
18.188.166.251 attack
mue-Direct access to plugin not allowed
2020-06-01 01:12:13
88.28.195.181 attack
Unauthorized connection attempt detected from IP address 88.28.195.181 to port 445
2020-06-01 00:49:51
83.209.60.116 attack
Unauthorized connection attempt detected from IP address 83.209.60.116 to port 23
2020-06-01 00:50:43
177.105.192.236 attackspambots
Unauthorized connection attempt detected from IP address 177.105.192.236 to port 23
2020-06-01 00:38:15
18.188.105.92 attackspam
 TCP (SYN) 18.188.105.92:53954 -> port 23, len 44
2020-06-01 01:02:52
78.176.131.200 attackspam
Unauthorized connection attempt detected from IP address 78.176.131.200 to port 445
2020-06-01 00:51:50
43.247.184.39 attackbotsspam
 TCP (SYN) 43.247.184.39:52813 -> port 1433, len 44
2020-06-01 01:00:52
165.22.163.227 attack
Unauthorized connection attempt detected from IP address 165.22.163.227 to port 5900
2020-06-01 00:40:24
45.183.56.140 attackspambots
Unauthorized connection attempt detected from IP address 45.183.56.140 to port 4389
2020-06-01 00:59:27
66.223.209.18 attackspam
Unauthorized connection attempt detected from IP address 66.223.209.18 to port 23
2020-06-01 00:55:51
1.237.132.42 attack
Unauthorized connection attempt detected from IP address 1.237.132.42 to port 23
2020-06-01 01:04:12
178.128.230.58 attack
Unauthorized connection attempt detected from IP address 178.128.230.58 to port 10000
2020-06-01 00:37:43

Recently Reported IPs

55.182.14.32 202.221.119.223 45.192.163.200 44.9.185.174
186.53.140.238 30.32.124.105 138.148.125.177 84.65.41.233
201.198.51.165 43.74.59.24 211.17.104.43 49.249.121.7
175.147.81.184 27.251.232.31 91.223.139.114 55.152.187.136
125.67.240.151 126.9.210.8 65.215.135.84 93.254.198.74