Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.242.137.231
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45828
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.242.137.231.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 06:01:39 CST 2025
;; MSG SIZE  rcvd: 108
Host info
231.137.242.221.in-addr.arpa is an alias for 231.224/28.137.242.221.in-addr.arpa.
231.224/28.137.242.221.in-addr.arpa domain name pointer tky-05.apptec.co.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
231.137.242.221.in-addr.arpa	canonical name = 231.224/28.137.242.221.in-addr.arpa.
231.224/28.137.242.221.in-addr.arpa	name = tky-05.apptec.co.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
88.84.200.139 attack
SSH bruteforce (Triggered fail2ban)
2019-11-21 03:56:25
173.219.133.94 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-21 04:19:28
77.55.212.168 attackbots
Repeated brute force against a port
2019-11-21 03:52:53
188.166.99.89 attackbotsspam
Automatic report - Banned IP Access
2019-11-21 04:13:08
62.90.235.90 attack
Repeated brute force against a port
2019-11-21 04:02:12
190.14.159.47 attack
Automatic report - Port Scan Attack
2019-11-21 04:01:47
138.97.14.126 attackspambots
445/tcp 445/tcp 445/tcp...
[2019-10-07/11-20]5pkt,1pt.(tcp)
2019-11-21 04:13:41
51.68.189.69 attackspambots
Nov 20 16:18:44 SilenceServices sshd[2921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.189.69
Nov 20 16:18:46 SilenceServices sshd[2921]: Failed password for invalid user caltabiano from 51.68.189.69 port 40426 ssh2
Nov 20 16:22:19 SilenceServices sshd[3955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.189.69
2019-11-21 04:12:45
23.228.90.14 attackbotsspam
$f2bV_matches
2019-11-21 04:14:08
210.16.100.132 attack
" "
2019-11-21 04:07:05
80.211.103.17 attackspam
$f2bV_matches
2019-11-21 03:46:44
193.203.10.53 attackbots
Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="
2019-11-21 04:18:59
189.31.188.187 attackbots
1433/tcp 1433/tcp
[2019-10-22/11-20]2pkt
2019-11-21 04:18:16
125.166.141.109 attackspambots
Automatic report - Port Scan Attack
2019-11-21 03:55:56
79.137.2.105 attackspambots
Repeated brute force against a port
2019-11-21 03:51:05

Recently Reported IPs

4.94.130.205 161.209.101.132 74.251.250.88 58.229.253.147
67.49.66.217 150.88.155.178 39.109.131.204 200.252.182.35
6.142.233.114 162.176.128.158 131.211.44.108 222.192.92.213
225.115.87.39 125.254.132.16 24.220.75.145 137.60.81.87
195.25.47.193 204.164.130.6 98.42.6.164 99.126.169.172