Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 182.20.158.242
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57368
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;182.20.158.242.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 09:34:45 CST 2025
;; MSG SIZE  rcvd: 107
Host info
242.158.20.182.in-addr.arpa domain name pointer p242.net182020158.tnc.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
242.158.20.182.in-addr.arpa	name = p242.net182020158.tnc.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
140.206.157.242 attackbots
" "
2020-04-06 15:58:45
125.91.127.21 attackbots
Apr  5 20:35:05 kapalua sshd\[5392\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.127.21  user=root
Apr  5 20:35:07 kapalua sshd\[5392\]: Failed password for root from 125.91.127.21 port 44318 ssh2
Apr  5 20:39:47 kapalua sshd\[5831\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.127.21  user=root
Apr  5 20:39:49 kapalua sshd\[5831\]: Failed password for root from 125.91.127.21 port 39009 ssh2
Apr  5 20:44:31 kapalua sshd\[6121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.91.127.21  user=root
2020-04-06 15:27:02
222.186.175.217 attackbots
Apr  6 09:14:21 eventyay sshd[5325]: Failed password for root from 222.186.175.217 port 2292 ssh2
Apr  6 09:14:25 eventyay sshd[5325]: Failed password for root from 222.186.175.217 port 2292 ssh2
Apr  6 09:14:28 eventyay sshd[5325]: Failed password for root from 222.186.175.217 port 2292 ssh2
Apr  6 09:14:31 eventyay sshd[5325]: Failed password for root from 222.186.175.217 port 2292 ssh2
...
2020-04-06 15:16:05
202.175.250.219 attackbotsspam
Apr  6 08:28:19 archiv sshd[29168]: Address 202.175.250.219 maps to 219.250.175.202.static.eastern-tele.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Apr  6 08:28:19 archiv sshd[29168]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.175.250.219  user=r.r
Apr  6 08:28:21 archiv sshd[29168]: Failed password for r.r from 202.175.250.219 port 49066 ssh2
Apr  6 08:28:21 archiv sshd[29168]: Received disconnect from 202.175.250.219 port 49066:11: Bye Bye [preauth]
Apr  6 08:28:21 archiv sshd[29168]: Disconnected from 202.175.250.219 port 49066 [preauth]
Apr  6 08:48:03 archiv sshd[29600]: Address 202.175.250.219 maps to 219.250.175.202.static.eastern-tele.com, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Apr  6 08:48:03 archiv sshd[29600]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.175.250.219  user=r.r
Apr  6 08:48:05 archiv ssh........
-------------------------------
2020-04-06 15:25:53
148.72.232.94 attack
$f2bV_matches
2020-04-06 15:25:02
117.119.84.34 attackbots
$f2bV_matches
2020-04-06 15:40:58
185.216.132.15 attack
Unauthorized connection attempt detected from IP address 185.216.132.15 to port 2222
2020-04-06 15:10:18
222.186.180.147 attack
Fail2Ban - SSH Bruteforce Attempt
2020-04-06 15:37:04
219.156.183.42 attackspambots
Automatic report - Port Scan Attack
2020-04-06 15:55:20
104.245.145.124 attack
(From samantha.barden@yahoo.com) Are You interested in an advertising service that charges less than $50 every month and sends hundreds of people who are ready to buy directly to your website? Check out: http://www.trafficmasters.xyz
2020-04-06 15:06:05
176.31.116.214 attackspam
(sshd) Failed SSH login from 176.31.116.214 (FR/France/kingdoms.easycreadoc.com): 5 in the last 3600 secs
2020-04-06 15:04:13
37.159.137.186 attackspambots
DATE:2020-04-06 05:53:43, IP:37.159.137.186, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-04-06 15:46:30
46.229.168.140 attackbots
inbound access attempt
2020-04-06 15:41:45
45.133.99.7 attack
Apr  6 09:03:36 relay postfix/smtpd\[30185\]: warning: unknown\[45.133.99.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  6 09:04:10 relay postfix/smtpd\[30186\]: warning: unknown\[45.133.99.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  6 09:04:26 relay postfix/smtpd\[31252\]: warning: unknown\[45.133.99.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  6 09:06:55 relay postfix/smtpd\[30185\]: warning: unknown\[45.133.99.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Apr  6 09:07:04 relay postfix/smtpd\[31252\]: warning: unknown\[45.133.99.7\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-04-06 15:28:38
119.196.184.101 attackbots
$f2bV_matches
2020-04-06 15:11:42

Recently Reported IPs

40.245.108.184 27.6.9.201 51.110.142.158 37.81.150.49
134.114.74.75 202.47.169.213 38.8.191.185 48.87.54.99
3.100.73.148 120.183.117.243 38.99.91.209 172.29.13.248
9.238.255.227 248.47.139.46 244.70.64.114 33.243.158.29
114.64.119.179 119.82.177.35 108.175.47.66 101.235.166.140