Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: New York City

Region: New York

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       128.242.0.0 - 128.242.255.255
CIDR:           128.242.0.0/16
NetName:        NTTA-128-242
NetHandle:      NET-128-242-0-0-1
Parent:         NET128 (NET-128-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   NTT America, Inc. (NTTAM-1)
RegDate:        2001-02-15
Updated:        2022-07-01
Comment:        Geofeed https://geo.ip.gin.ntt.net/geofeeds/geofeeds.csv
Comment:        
Comment:        Reassignment information for this block is
Comment:        available at rwhois.gin.ntt.net port 4321
Ref:            https://rdap.arin.net/registry/ip/128.242.0.0


OrgName:        NTT America, Inc.
OrgId:          NTTAM-1
Address:        15809 Bear Creek Pkwy
Address:        Suite 320
City:           Redmond
StateProv:      WA
PostalCode:     98052
Country:        US
RegDate:        2005-12-08
Updated:        2024-03-04
Ref:            https://rdap.arin.net/registry/entity/NTTAM-1

ReferralServer:  rwhois://rwhois.gin.ntt.net:4321

OrgNOCHandle: NASC-ARIN
OrgNOCName:   NTT America Support Contact
OrgNOCPhone:  +1-877-688-6625 
OrgNOCEmail:  ce-support@gin.ntt.net
OrgNOCRef:    https://rdap.arin.net/registry/entity/NASC-ARIN

OrgRoutingHandle: PEERI-ARIN
OrgRoutingName:   Peering
OrgRoutingPhone:  +1-877-688-6625 
OrgRoutingEmail:  peering@ntt.net
OrgRoutingRef:    https://rdap.arin.net/registry/entity/PEERI-ARIN

OrgTechHandle: VIPAR-ARIN
OrgTechName:   VIPAR
OrgTechPhone:  +1-877-688-6625 
OrgTechEmail:  ipr@gin.ntt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/VIPAR-ARIN

OrgAbuseHandle: NAAC-ARIN
OrgAbuseName:   NTT America Abuse Contact
OrgAbusePhone:  +1-877-688-6625 
OrgAbuseEmail:  abuse@ntt.net
OrgAbuseRef:    https://rdap.arin.net/registry/entity/NAAC-ARIN

OrgTechHandle: CANDE70-ARIN
OrgTechName:   Candela, Massimo 
OrgTechPhone:  +1-214-915-1366 
OrgTechEmail:  massimo@ntt.net
OrgTechRef:    https://rdap.arin.net/registry/entity/CANDE70-ARIN

RTechHandle: VIA4-ORG-ARIN
RTechName:   VIPAR
RTechPhone:  +1-877-688-6625 
RTechEmail:  ipr@gin.ntt.net
RTechRef:    https://rdap.arin.net/registry/entity/VIA4-ORG-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#



Found a referral to rwhois.gin.ntt.net:4321.

%rwhois V-1.5:0078b6:00 rwhois.gin.ntt.net (Vipar 0.1a. Comments to ipr@gin.ntt.net)
network:Class-Name:network
network:Auth-Area:128.242.96.0/19
network:ID:NETBLK-USV4-128-242-096.127.0.0.1/32
network:Handle:NETBLK-USV4-128-242-096
network:Network-Name:USV4-128-242-096
network:IP-Network:128.242.96.0/19
network:In-Addr-Server;I:GIN1-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN2-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN3-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN4-HST.127.0.0.1/32
network:In-Addr-Server;I:GIN5-HST.127.0.0.1/32
network:IP-Network-Block:128.242.96.0 - 128.242.127.255
network:Org-Name:NTT DATA
network:Street-Address:8300 E Maplewood Ave. Suite 400
network:City:Greenwood Village
network:State:CO
network:Postal-Code:80111
network:Country-Code:US
network:Tech-Contact;I:GIN-BBV4.127.0.0.1/32
network:Created:2000-10-17 21:12:51+00
network:Updated:2025-03-12 15:34:51.53328+00

%ok
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 128.242.104.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6052
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;128.242.104.43.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026032901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 30 16:04:11 CST 2026
;; MSG SIZE  rcvd: 107
Host info
Host 43.104.242.128.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 43.104.242.128.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
197.51.193.194 attackspam
Honeypot attack, port: 81, PTR: host-197.51.193.194.tedata.net.
2020-09-05 14:29:38
49.207.22.42 attack
Port Scan
...
2020-09-05 14:33:48
154.70.208.66 attackspambots
Sep  5 00:01:35 haigwepa sshd[32486]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=154.70.208.66 
Sep  5 00:01:37 haigwepa sshd[32486]: Failed password for invalid user dp from 154.70.208.66 port 49078 ssh2
...
2020-09-05 14:09:25
122.164.242.113 attackspambots
Sep  4 18:50:25 mellenthin postfix/smtpd[32087]: NOQUEUE: reject: RCPT from unknown[122.164.242.113]: 554 5.7.1 Service unavailable; Client host [122.164.242.113] blocked using zen.spamhaus.org; https://www.spamhaus.org/query/ip/122.164.242.113; from= to= proto=ESMTP helo=
2020-09-05 14:46:52
51.75.123.7 attackspam
51.75.123.7 - - [05/Sep/2020:06:17:49 +0100] "POST /wp-login.php HTTP/1.1" 200 2415 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.123.7 - - [05/Sep/2020:06:17:50 +0100] "POST /wp-login.php HTTP/1.1" 200 2365 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.75.123.7 - - [05/Sep/2020:06:17:50 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-05 14:39:45
60.2.224.234 attackspam
Sep  5 07:53:54 server sshd[5060]: Failed password for root from 60.2.224.234 port 40194 ssh2
Sep  5 08:05:31 server sshd[10479]: Failed password for invalid user jdoe from 60.2.224.234 port 45244 ssh2
Sep  5 08:14:40 server sshd[14792]: Failed password for invalid user dasusr1 from 60.2.224.234 port 42332 ssh2
2020-09-05 14:23:18
82.115.213.204 attack
REQUESTED PAGE: /wp-json/contact-form-7/v1/contact-forms/382/feedback
2020-09-05 14:18:58
185.220.102.6 attackbotsspam
Sep  5 02:52:58 ws22vmsma01 sshd[13751]: Failed password for root from 185.220.102.6 port 44579 ssh2
Sep  5 02:53:01 ws22vmsma01 sshd[13751]: Failed password for root from 185.220.102.6 port 44579 ssh2
...
2020-09-05 14:14:35
149.129.52.21 attackbotsspam
149.129.52.21 - - \[05/Sep/2020:07:15:15 +0200\] "POST /wp-login.php HTTP/1.0" 200 9485 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
149.129.52.21 - - \[05/Sep/2020:07:15:19 +0200\] "POST /wp-login.php HTTP/1.0" 200 9493 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
149.129.52.21 - - \[05/Sep/2020:07:15:22 +0200\] "POST /wp-login.php HTTP/1.0" 200 9481 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-09-05 14:12:26
197.51.216.156 attack
1599238270 - 09/04/2020 18:51:10 Host: 197.51.216.156/197.51.216.156 Port: 445 TCP Blocked
2020-09-05 14:05:19
95.49.251.183 attackspambots
Automatic report - Banned IP Access
2020-09-05 14:11:08
195.54.160.180 attackbotsspam
Sep  5 08:32:16 home sshd[789933]: Invalid user payingit from 195.54.160.180 port 41555
Sep  5 08:32:16 home sshd[789933]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.54.160.180 
Sep  5 08:32:16 home sshd[789933]: Invalid user payingit from 195.54.160.180 port 41555
Sep  5 08:32:18 home sshd[789933]: Failed password for invalid user payingit from 195.54.160.180 port 41555 ssh2
Sep  5 08:32:20 home sshd[789936]: Invalid user pi from 195.54.160.180 port 52420
...
2020-09-05 14:34:42
220.76.205.178 attack
Sep  4 18:13:59 sachi sshd\[19420\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.178  user=root
Sep  4 18:14:01 sachi sshd\[19420\]: Failed password for root from 220.76.205.178 port 54205 ssh2
Sep  4 18:18:13 sachi sshd\[19706\]: Invalid user gavin from 220.76.205.178
Sep  4 18:18:13 sachi sshd\[19706\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.76.205.178
Sep  4 18:18:15 sachi sshd\[19706\]: Failed password for invalid user gavin from 220.76.205.178 port 55735 ssh2
2020-09-05 14:34:06
106.12.3.28 attackspam
Sep  5 08:15:14 lnxweb62 sshd[25523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.3.28
2020-09-05 14:23:46
106.13.237.235 attackspambots
Invalid user vbox from 106.13.237.235 port 44720
2020-09-05 14:31:53

Recently Reported IPs

2606:4700:10::6816:4063 2606:4700:10::6814:8744 2606:4700:10::ac43:2621 2606:4700:10::6814:7663
2606:4700:10::6816:1011 2606:4700:10::6816:2500 134.35.157.163 2606:4700:10::6814:8142
2606:4700:10::ac43:1024 2606:4700:10::6814:6566 2606:4700:10::6814:5930 2606:4700:10::6816:4153
216.51.144.105 50.26.175.199 216.167.81.18 196.21.82.154
205.70.134.42 10.20.9.104 97.65.67.161 34.26.247.78