Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 163.140.242.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1419
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;163.140.242.96.			IN	A

;; AUTHORITY SECTION:
.			523	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020020201 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 03 03:17:43 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 96.242.140.163.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 96.242.140.163.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
43.224.249.224 attack
Unauthorized connection attempt detected from IP address 43.224.249.224 to port 2220 [J]
2020-01-07 14:49:03
23.92.143.172 attackspam
Honeypot attack, port: 5555, PTR: dhcp-23-92-143-172.cable.user.start.ca.
2020-01-07 14:51:36
92.86.127.175 attack
Unauthorized connection attempt detected from IP address 92.86.127.175 to port 2220 [J]
2020-01-07 14:42:47
220.133.191.39 attackbotsspam
Unauthorized connection attempt detected from IP address 220.133.191.39 to port 4567 [J]
2020-01-07 14:55:36
122.116.79.85 attackspambots
Unauthorized connection attempt detected from IP address 122.116.79.85 to port 81 [J]
2020-01-07 15:06:30
170.106.36.97 attackspam
Unauthorized connection attempt detected from IP address 170.106.36.97 to port 8194 [J]
2020-01-07 15:02:49
177.68.242.200 attackspambots
Unauthorized connection attempt detected from IP address 177.68.242.200 to port 8080 [J]
2020-01-07 15:01:28
218.161.87.48 attackbotsspam
Unauthorized connection attempt detected from IP address 218.161.87.48 to port 23 [J]
2020-01-07 14:56:23
201.221.158.246 attack
Unauthorized connection attempt detected from IP address 201.221.158.246 to port 80 [J]
2020-01-07 14:58:18
188.11.99.244 attackbots
Unauthorized connection attempt detected from IP address 188.11.99.244 to port 80 [J]
2020-01-07 14:29:38
87.66.16.6 attack
Jan  7 05:41:34 collab sshd[14103]: Invalid user postgres from 87.66.16.6
Jan  7 05:41:36 collab sshd[14103]: Failed password for invalid user postgres from 87.66.16.6 port 58137 ssh2
Jan  7 05:41:36 collab sshd[14103]: Received disconnect from 87.66.16.6: 11: Bye Bye [preauth]
Jan  7 06:00:25 collab sshd[14999]: Invalid user montanin from 87.66.16.6


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=87.66.16.6
2020-01-07 14:44:17
203.218.51.236 attackspam
Unauthorized connection attempt detected from IP address 203.218.51.236 to port 5555 [J]
2020-01-07 14:57:46
150.109.170.192 attackbots
Unauthorized connection attempt detected from IP address 150.109.170.192 to port 8080 [J]
2020-01-07 15:04:03
187.226.121.109 attackbots
Unauthorized connection attempt detected from IP address 187.226.121.109 to port 119 [J]
2020-01-07 14:30:02
106.110.111.186 attack
Honeypot attack, port: 23, PTR: PTR record not found
2020-01-07 15:12:11

Recently Reported IPs

183.17.194.85 194.176.14.77 45.74.132.203 84.80.227.39
161.122.110.105 189.198.135.152 206.112.151.226 216.120.98.204
84.97.91.114 75.194.0.195 148.201.213.220 119.93.148.184
194.42.152.111 86.242.154.111 119.93.95.202 39.55.133.141
90.252.64.209 12.113.255.7 61.206.125.132 170.135.216.74