Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Karasawa

Region: Kanagawa

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 153.164.119.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58581
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;153.164.119.122.		IN	A

;; AUTHORITY SECTION:
.			325	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022061700 1800 900 604800 86400

;; Query time: 70 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 17 20:54:22 CST 2022
;; MSG SIZE  rcvd: 108
Host info
122.119.164.153.in-addr.arpa domain name pointer p1363122-ipngn12001hodogaya.kanagawa.ocn.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
122.119.164.153.in-addr.arpa	name = p1363122-ipngn12001hodogaya.kanagawa.ocn.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
59.124.205.214 attackspambots
2020-05-27T04:06:41.870219devel sshd[4589]: Failed password for invalid user address from 59.124.205.214 port 54376 ssh2
2020-05-27T04:19:57.794448devel sshd[5539]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59-124-205-214.hinet-ip.hinet.net  user=root
2020-05-27T04:19:59.473373devel sshd[5539]: Failed password for root from 59.124.205.214 port 45754 ssh2
2020-05-27 17:18:00
118.24.13.248 attackbots
May 27 10:25:45 mout sshd[11228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.13.248  user=root
May 27 10:25:47 mout sshd[11228]: Failed password for root from 118.24.13.248 port 53818 ssh2
2020-05-27 17:38:39
104.248.92.124 attackspam
May 27 09:15:25 localhost sshd[52624]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.92.124  user=root
May 27 09:15:28 localhost sshd[52624]: Failed password for root from 104.248.92.124 port 52218 ssh2
May 27 09:18:55 localhost sshd[53055]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.92.124  user=root
May 27 09:18:57 localhost sshd[53055]: Failed password for root from 104.248.92.124 port 58448 ssh2
May 27 09:22:33 localhost sshd[53493]: Invalid user www from 104.248.92.124 port 36448
...
2020-05-27 17:32:42
222.186.173.142 attack
May 27 11:34:32 melroy-server sshd[28328]: Failed password for root from 222.186.173.142 port 42226 ssh2
May 27 11:34:36 melroy-server sshd[28328]: Failed password for root from 222.186.173.142 port 42226 ssh2
...
2020-05-27 17:34:48
46.101.151.97 attack
srv02 SSH BruteForce Attacks 22 ..
2020-05-27 17:40:57
47.91.28.34 attackbotsspam
May 27 05:50:49 prox sshd[24508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=47.91.28.34 
May 27 05:50:52 prox sshd[24508]: Failed password for invalid user jen from 47.91.28.34 port 45108 ssh2
2020-05-27 17:25:53
74.82.47.55 attack
Port Scan detected!
...
2020-05-27 17:58:06
219.129.237.188 attackspam
2020-05-26 05:49:25 Reject access to port(s):3306 1 times a day
2020-05-27 17:41:57
49.235.134.46 attack
May 27 06:41:21 eventyay sshd[5824]: Failed password for root from 49.235.134.46 port 42466 ssh2
May 27 06:46:00 eventyay sshd[5929]: Failed password for root from 49.235.134.46 port 36624 ssh2
...
2020-05-27 17:35:24
190.111.148.139 attackspambots
firewall-block, port(s): 445/tcp
2020-05-27 17:50:06
198.108.66.190 attack
firewall-block, port(s): 2323/tcp
2020-05-27 17:45:25
167.99.202.143 attackspambots
May 27 10:53:10 pornomens sshd\[32727\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.202.143  user=root
May 27 10:53:11 pornomens sshd\[32727\]: Failed password for root from 167.99.202.143 port 46430 ssh2
May 27 11:01:46 pornomens sshd\[362\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.99.202.143  user=root
...
2020-05-27 17:19:02
112.85.42.87 attackbotsspam
2020-05-27T09:37:21.887660shield sshd\[21503\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2020-05-27T09:37:23.770253shield sshd\[21503\]: Failed password for root from 112.85.42.87 port 60433 ssh2
2020-05-27T09:37:25.989872shield sshd\[21503\]: Failed password for root from 112.85.42.87 port 60433 ssh2
2020-05-27T09:37:27.484601shield sshd\[21503\]: Failed password for root from 112.85.42.87 port 60433 ssh2
2020-05-27T09:41:14.710995shield sshd\[22085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.87  user=root
2020-05-27 17:47:14
185.153.196.5 attack
firewall-block, port(s): 1018/tcp, 3385/tcp, 3392/tcp, 3394/tcp, 4001/tcp, 7777/tcp, 8888/tcp, 33189/tcp, 33333/tcp, 50001/tcp
2020-05-27 17:51:33
40.89.134.161 attackspambots
Automatic report - XMLRPC Attack
2020-05-27 17:40:19

Recently Reported IPs

169.192.58.40 13.20.98.232 234.36.245.191 149.99.11.210
249.112.163.113 177.212.49.224 250.161.49.192 228.227.106.112
84.199.150.49 134.183.197.250 39.251.41.188 77.84.174.167
231.242.192.54 245.67.122.33 73.148.149.160 209.11.165.101
249.52.197.118 58.15.52.189 160.238.38.251 113.25.101.215