Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Numazu

Region: Shizuoka

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.205.242.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28395
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;157.205.242.48.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103101 1800 900 604800 86400

;; Query time: 345 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 01 11:35:13 CST 2019
;; MSG SIZE  rcvd: 118
Host info
Host 48.242.205.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.242.205.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.175.93.101 attack
10/08/2019-12:29:07.008972 185.175.93.101 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-10-08 18:35:44
68.183.178.162 attackspambots
Oct  8 09:59:05 localhost sshd\[10370\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162  user=root
Oct  8 09:59:07 localhost sshd\[10370\]: Failed password for root from 68.183.178.162 port 39298 ssh2
Oct  8 10:03:19 localhost sshd\[10790\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.178.162  user=root
2019-10-08 18:36:57
193.70.114.154 attack
Oct  8 12:56:23 hosting sshd[5903]: Invalid user 1234@abcd from 193.70.114.154 port 51436
...
2019-10-08 19:03:23
92.118.160.1 attackspam
08.10.2019 05:44:02 Connection to port 8443 blocked by firewall
2019-10-08 18:35:26
171.103.138.46 attackbotsspam
Chat Spam
2019-10-08 18:52:16
49.88.112.68 attackspambots
Oct  8 13:22:44 sauna sshd[18488]: Failed password for root from 49.88.112.68 port 49193 ssh2
...
2019-10-08 18:36:12
54.37.138.172 attackspam
Oct  8 11:17:34 vps691689 sshd[29317]: Failed password for root from 54.37.138.172 port 33638 ssh2
Oct  8 11:21:40 vps691689 sshd[29453]: Failed password for root from 54.37.138.172 port 43764 ssh2
...
2019-10-08 18:53:39
132.232.58.52 attack
2019-10-08T07:32:43.936233tmaserv sshd\[11972\]: Invalid user Tour@123 from 132.232.58.52 port 29179
2019-10-08T07:32:43.940570tmaserv sshd\[11972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.58.52
2019-10-08T07:32:45.977992tmaserv sshd\[11972\]: Failed password for invalid user Tour@123 from 132.232.58.52 port 29179 ssh2
2019-10-08T07:38:13.554035tmaserv sshd\[12211\]: Invalid user Angela2017 from 132.232.58.52 port 11786
2019-10-08T07:38:13.558106tmaserv sshd\[12211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.58.52
2019-10-08T07:38:15.900970tmaserv sshd\[12211\]: Failed password for invalid user Angela2017 from 132.232.58.52 port 11786 ssh2
...
2019-10-08 19:04:09
68.183.54.37 attackbots
Oct  6 16:57:15 server3 sshd[780649]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.54.37  user=r.r
Oct  6 16:57:17 server3 sshd[780649]: Failed password for r.r from 68.183.54.37 port 36938 ssh2
Oct  6 16:57:17 server3 sshd[780649]: Received disconnect from 68.183.54.37: 11: Bye Bye [preauth]
Oct  6 17:16:53 server3 sshd[781167]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.54.37  user=r.r
Oct  6 17:16:55 server3 sshd[781167]: Failed password for r.r from 68.183.54.37 port 52518 ssh2
Oct  6 17:16:55 server3 sshd[781167]: Received disconnect from 68.183.54.37: 11: Bye Bye [preauth]
Oct  6 17:20:41 server3 sshd[781261]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.54.37  user=r.r
Oct  6 17:20:43 server3 sshd[781261]: Failed password for r.r from 68.183.54.37 port 36640 ssh2
Oct  6 23:32:25 server3 sshd[793419]: pam_unix(sshd........
-------------------------------
2019-10-08 19:01:48
68.183.156.156 attack
Oct  8 12:48:13 vps647732 sshd[5872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.156.156
Oct  8 12:48:15 vps647732 sshd[5872]: Failed password for invalid user manorel from 68.183.156.156 port 45548 ssh2
...
2019-10-08 18:51:30
118.167.117.239 attackbots
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/118.167.117.239/ 
 TW - 1H : (320)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 118.167.117.239 
 
 CIDR : 118.167.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 15 
  3H - 35 
  6H - 77 
 12H - 138 
 24H - 309 
 
 DateTime : 2019-10-08 05:51:45 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-08 18:32:04
54.36.182.244 attack
ssh failed login
2019-10-08 18:59:30
148.70.204.218 attack
Oct  8 06:18:30 vps691689 sshd[22426]: Failed password for root from 148.70.204.218 port 42136 ssh2
Oct  8 06:24:37 vps691689 sshd[22647]: Failed password for root from 148.70.204.218 port 53388 ssh2
...
2019-10-08 19:05:55
171.99.253.119 attackbotsspam
" "
2019-10-08 19:12:43
43.226.144.45 attackspam
Oct  8 13:24:27 www5 sshd\[602\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.144.45  user=root
Oct  8 13:24:29 www5 sshd\[602\]: Failed password for root from 43.226.144.45 port 57788 ssh2
Oct  8 13:29:08 www5 sshd\[1460\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.226.144.45  user=root
...
2019-10-08 18:48:18

Recently Reported IPs

141.225.21.200 34.118.255.146 199.159.171.112 147.211.236.169
192.223.161.255 237.58.204.198 240.4.147.196 222.120.65.86
22.105.14.156 44.250.15.128 65.115.41.232 25.41.192.199
38.201.217.157 79.248.13.66 213.105.39.154 69.110.251.207
27.112.26.147 131.45.249.181 138.124.22.137 133.38.72.53