Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: KDDI Corporation

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
203.140.148.238 attackspam
Unauthorized connection attempt detected from IP address 203.140.148.238 to port 23 [J]
2020-03-03 08:16:19
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 203.140.148.139
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31858
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;203.140.148.139.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032602 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 27 09:30:59 CST 2025
;; MSG SIZE  rcvd: 108
Host info
139.148.140.203.in-addr.arpa domain name pointer KD203140148139.ec-userreverse.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
139.148.140.203.in-addr.arpa	name = KD203140148139.ec-userreverse.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.128.162.98 attackbots
Nov  9 13:05:40 sso sshd[20026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.128.162.98
Nov  9 13:05:42 sso sshd[20026]: Failed password for invalid user mcollins from 27.128.162.98 port 51400 ssh2
...
2019-11-09 20:06:53
188.69.135.214 attackspambots
SPAM Delivery Attempt
2019-11-09 19:56:06
80.211.129.148 attackbotsspam
SSH brutforce
2019-11-09 19:34:28
62.234.156.120 attackspam
Nov  9 09:57:50 lnxweb61 sshd[6051]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.156.120
2019-11-09 19:28:37
212.129.143.156 attack
Nov  9 09:31:26 vpn01 sshd[25551]: Failed password for root from 212.129.143.156 port 48480 ssh2
...
2019-11-09 19:28:50
37.44.252.151 attackspam
Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="
2019-11-09 20:00:43
223.72.83.75 attackbots
Fail2Ban - FTP Abuse Attempt
2019-11-09 19:53:05
113.141.189.244 attackbots
Port 1433 Scan
2019-11-09 19:58:10
222.186.175.147 attack
Nov  9 12:46:10 dcd-gentoo sshd[27075]: User root from 222.186.175.147 not allowed because none of user's groups are listed in AllowGroups
Nov  9 12:46:15 dcd-gentoo sshd[27075]: error: PAM: Authentication failure for illegal user root from 222.186.175.147
Nov  9 12:46:10 dcd-gentoo sshd[27075]: User root from 222.186.175.147 not allowed because none of user's groups are listed in AllowGroups
Nov  9 12:46:15 dcd-gentoo sshd[27075]: error: PAM: Authentication failure for illegal user root from 222.186.175.147
Nov  9 12:46:10 dcd-gentoo sshd[27075]: User root from 222.186.175.147 not allowed because none of user's groups are listed in AllowGroups
Nov  9 12:46:15 dcd-gentoo sshd[27075]: error: PAM: Authentication failure for illegal user root from 222.186.175.147
Nov  9 12:46:15 dcd-gentoo sshd[27075]: Failed keyboard-interactive/pam for invalid user root from 222.186.175.147 port 6182 ssh2
...
2019-11-09 19:48:30
202.54.157.6 attack
Nov  9 10:33:45 lnxded63 sshd[5635]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.54.157.6
2019-11-09 20:01:17
110.49.71.247 attackspambots
Automatic report - Banned IP Access
2019-11-09 19:43:55
185.156.73.52 attackspam
11/09/2019-07:10:43.896256 185.156.73.52 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-09 20:14:02
160.153.156.131 attackspambots
Automatic report - XMLRPC Attack
2019-11-09 19:47:03
86.102.88.242 attack
SSH bruteforce (Triggered fail2ban)
2019-11-09 19:41:08
103.27.239.216 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-11-09 20:06:01

Recently Reported IPs

171.128.81.179 106.242.64.165 6.120.179.165 203.150.108.17
109.19.216.165 95.47.240.3 32.216.180.178 10.200.38.6
106.146.213.4 166.146.147.8 106.146.213.5 143.198.203.89
71.31.57.35 136.15.167.120 19.214.103.20 100.126.123.2
189.160.222.251 106.249.40.10 157.243.153.143 12.133.157.22