Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kamaishi

Region: Iwate

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: NTT Communications Corporation

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.2.20.71
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40163
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;180.2.20.71.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082400 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Aug 25 01:28:37 CST 2019
;; MSG SIZE  rcvd: 115
Host info
71.20.2.180.in-addr.arpa domain name pointer p91071-ipngn1701morioka.iwate.ocn.ne.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
71.20.2.180.in-addr.arpa	name = p91071-ipngn1701morioka.iwate.ocn.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.215.203.3 attackbotsspam
Unauthorized connection attempt from IP address 103.215.203.3 on Port 445(SMB)
2020-02-25 07:07:25
222.73.134.192 attack
Brute force blocker - service: proftpd1 - aantal: 31 - Thu May  3 16:50:16 2018
2020-02-25 07:06:44
183.171.112.107 attackspam
Unauthorized connection attempt from IP address 183.171.112.107 on Port 445(SMB)
2020-02-25 07:08:12
94.143.197.128 attackbotsspam
Unauthorised access (Feb 24) SRC=94.143.197.128 LEN=52 TTL=113 ID=19641 DF TCP DPT=445 WINDOW=8192 SYN
2020-02-25 06:54:05
118.223.5.173 attack
Brute force blocker - service: proftpd1, proftpd2 - aantal: 38 - Wed May  2 22:25:17 2018
2020-02-25 07:11:09
120.28.192.143 attack
Unauthorized connection attempt from IP address 120.28.192.143 on Port 445(SMB)
2020-02-25 06:38:06
114.86.226.245 attackbotsspam
Unauthorized connection attempt from IP address 114.86.226.245 on Port 445(SMB)
2020-02-25 06:55:35
218.173.20.196 attackbotsspam
1582550187 - 02/24/2020 14:16:27 Host: 218.173.20.196/218.173.20.196 Port: 23 TCP Blocked
2020-02-25 06:48:47
114.244.12.175 attackspambots
Brute force blocker - service: proftpd1 - aantal: 99 - Wed May  2 09:00:17 2018
2020-02-25 07:16:08
218.92.0.189 attackspambots
Feb 24 23:38:59 legacy sshd[31216]: Failed password for root from 218.92.0.189 port 32750 ssh2
Feb 24 23:40:01 legacy sshd[31222]: Failed password for root from 218.92.0.189 port 40513 ssh2
...
2020-02-25 06:49:53
123.182.226.44 attackspambots
port scan and connect, tcp 23 (telnet)
2020-02-25 06:49:33
98.211.131.140 attackbots
firewall-block, port(s): 23/tcp
2020-02-25 07:17:57
123.113.0.189 attackbotsspam
Brute force blocker - service: proftpd1, proftpd2 - aantal: 39 - Wed May  2 09:15:16 2018
2020-02-25 07:15:47
206.189.107.181 attackspam
WordPress brute force
2020-02-25 06:54:55
175.176.90.175 attackspambots
Unauthorized connection attempt from IP address 175.176.90.175 on Port 445(SMB)
2020-02-25 06:39:34

Recently Reported IPs

171.66.2.36 117.189.139.72 91.243.150.46 156.62.214.110
63.46.248.209 112.231.176.68 89.72.51.96 65.5.28.38
49.205.84.142 151.217.75.58 81.5.25.113 112.174.71.255
210.84.109.143 211.149.160.215 194.100.196.235 53.97.36.120
72.235.208.60 87.213.43.69 98.213.30.44 47.114.35.228