Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Kyrgyzstan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
212.42.122.75 attackspambots
Port probing on unauthorized port 1433
2020-08-11 08:15:30
212.42.122.66 attack
Unauthorized connection attempt detected from IP address 212.42.122.66 to port 21 [T]
2020-01-30 17:18:01
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.42.122.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59870
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.42.122.148.			IN	A

;; AUTHORITY SECTION:
.			284	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 09:13:04 CST 2022
;; MSG SIZE  rcvd: 107
Host info
148.122.42.212.in-addr.arpa domain name pointer 212-42-122-148.elcat.kg.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.122.42.212.in-addr.arpa	name = 212-42-122-148.elcat.kg.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.111.132.33 attack
Unauthorized connection attempt detected from IP address 41.111.132.33 to port 445
2020-01-08 00:54:13
117.64.226.45 attackspam
SMTP nagging
2020-01-08 01:30:12
198.27.80.123 attack
Attempt to run wp-login.php
2020-01-08 01:21:17
150.95.25.124 attackbotsspam
Unauthorized connection attempt
IP: 150.95.25.124
Ports affected
    Simple Mail Transfer (25) 
    Message Submission (587) 
Abuse Confidence rating 31%
ASN Details
   AS135161 GMO-Z com NetDesign Holdings Co. Ltd.
   Singapore (SG)
   CIDR 150.95.24.0/22
Log Date: 7/01/2020 12:53:55 PM UTC
2020-01-08 01:26:33
80.211.43.205 attackbots
Unauthorized connection attempt detected from IP address 80.211.43.205 to port 2220 [J]
2020-01-08 01:13:06
181.211.112.2 attack
Unauthorized connection attempt detected from IP address 181.211.112.2 to port 2220 [J]
2020-01-08 00:53:56
41.41.71.195 attack
Honeypot attack, port: 23, PTR: host-41.41.71.195.tedata.net.
2020-01-08 01:25:29
223.71.167.163 attackspambots
Unauthorized connection attempt detected from IP address 223.71.167.163 to port 3333 [T]
2020-01-08 01:10:25
162.158.74.101 attack
Fake GoogleBot
2020-01-08 01:03:52
119.160.219.5 attackbotsspam
Unauthorized connection attempt detected from IP address 119.160.219.5 to port 1433 [J]
2020-01-08 01:02:53
149.202.216.239 attack
Trying ports that it shouldn't be.
2020-01-08 01:09:44
179.180.63.191 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 07-01-2020 13:00:15.
2020-01-08 01:09:10
117.7.98.95 attack
Unauthorized connection attempt from IP address 117.7.98.95 on Port 445(SMB)
2020-01-08 01:04:57
159.203.36.154 attack
Brute-force attempt banned
2020-01-08 01:19:59
124.109.62.34 attackbotsspam
firewall-block, port(s): 445/tcp
2020-01-08 00:58:39

Recently Reported IPs

46.98.125.185 37.144.247.197 189.212.123.121 154.160.15.113
42.192.205.234 109.15.204.149 112.249.42.230 187.35.149.152
31.44.185.119 86.222.113.132 45.190.158.130 139.59.65.30
34.141.81.38 82.103.116.126 217.172.113.132 124.239.44.161
5.27.18.102 78.85.112.105 93.227.56.178 198.100.150.87