Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: SoftBank

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 218.141.142.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65140
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;218.141.142.48.			IN	A

;; AUTHORITY SECTION:
.			425	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022041102 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 12 11:10:35 CST 2022
;; MSG SIZE  rcvd: 107
Host info
48.142.141.218.in-addr.arpa domain name pointer softbank218141142048.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.142.141.218.in-addr.arpa	name = softbank218141142048.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
36.75.140.162 attack
Brute force SMTP login attempted.
...
2019-10-23 19:32:30
61.12.76.82 attackbots
2019-10-22T20:46:37.642323suse-nuc sshd[15505]: Invalid user in from 61.12.76.82 port 54284
...
2019-10-23 19:14:30
105.216.36.101 attackbots
Unauthorized IMAP connection attempt
2019-10-23 19:35:38
92.255.178.230 attackspambots
Brute force SMTP login attempted.
...
2019-10-23 19:18:51
184.185.2.122 attackbots
IMAP brute force
...
2019-10-23 19:18:18
31.13.67.7 attackbots
Attempted User Privilege Gain ET INFO Session Traversal Utilities for NAT (STUN Binding Request) Ports 54615 and 3478
2019-10-23 19:21:06
158.69.250.183 attackspambots
Oct 23 05:40:27 tux-35-217 sshd\[28748\]: Invalid user mehrdad from 158.69.250.183 port 33844
Oct 23 05:40:27 tux-35-217 sshd\[28748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.250.183
Oct 23 05:40:29 tux-35-217 sshd\[28748\]: Failed password for invalid user mehrdad from 158.69.250.183 port 33844 ssh2
Oct 23 05:46:08 tux-35-217 sshd\[28768\]: Invalid user mehrdad from 158.69.250.183 port 48548
Oct 23 05:46:08 tux-35-217 sshd\[28768\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.250.183
...
2019-10-23 19:30:03
142.93.251.1 attack
ssh failed login
2019-10-23 19:17:15
139.198.5.79 attack
2019-10-22T22:40:12.656278mizuno.rwx.ovh sshd[3042107]: Connection from 139.198.5.79 port 59588 on 78.46.61.178 port 22 rdomain ""
2019-10-22T22:40:16.331350mizuno.rwx.ovh sshd[3042107]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.5.79  user=root
2019-10-22T22:40:18.136263mizuno.rwx.ovh sshd[3042107]: Failed password for root from 139.198.5.79 port 59588 ssh2
2019-10-23T00:46:31.907924mizuno.rwx.ovh sshd[3060906]: Connection from 139.198.5.79 port 46374 on 78.46.61.178 port 22 rdomain ""
2019-10-23T00:46:33.379536mizuno.rwx.ovh sshd[3060906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.198.5.79  user=root
2019-10-23T00:46:35.374258mizuno.rwx.ovh sshd[3060906]: Failed password for root from 139.198.5.79 port 46374 ssh2
...
2019-10-23 19:15:40
154.70.208.66 attackbotsspam
Automatic report - Banned IP Access
2019-10-23 19:36:09
189.254.33.157 attackspambots
Oct 23 10:06:08 XXX sshd[40001]: Invalid user user from 189.254.33.157 port 50957
2019-10-23 19:10:31
45.146.203.213 attackbotsspam
Postfix DNSBL listed. Trying to send SPAM.
2019-10-23 19:30:30
164.132.53.185 attack
$f2bV_matches
2019-10-23 19:10:49
178.128.150.158 attackspam
F2B jail: sshd. Time: 2019-10-23 09:26:08, Reported by: VKReport
2019-10-23 19:28:50
192.99.197.168 attack
Automatic report - XMLRPC Attack
2019-10-23 19:39:20

Recently Reported IPs

45.203.81.55 201.79.2.236 125.197.170.199 203.113.162.202
188.22.89.207 153.231.128.66 179.7.162.163 9.206.192.229
234.2.161.108 44.195.14.247 172.238.129.251 168.106.132.129
59.247.183.133 216.222.27.247 192.231.109.145 153.130.6.187
144.168.26.165 129.105.202.197 178.253.71.7 202.193.226.109