Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.242.172.157
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6890
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.242.172.157.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 21:29:05 CST 2025
;; MSG SIZE  rcvd: 108
Host info
157.172.242.221.in-addr.arpa domain name pointer 221x242x172x157.ap221.ftth.ucom.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
157.172.242.221.in-addr.arpa	name = 221x242x172x157.ap221.ftth.ucom.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
172.104.94.253 attack
 TCP (SYN) 172.104.94.253:47650 -> port 81, len 44
2020-08-05 08:39:06
163.172.93.131 attackbots
Failed password for root from 163.172.93.131 port 54944 ssh2
2020-08-05 08:34:53
165.3.91.27 attack
DATE:2020-08-05 00:23:08, IP:165.3.91.27, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-08-05 08:21:37
177.152.89.14 attackbots
Automatic report - Port Scan Attack
2020-08-05 08:35:10
218.78.48.37 attackbots
prod11
...
2020-08-05 08:23:04
106.12.165.53 attackspambots
$f2bV_matches
2020-08-05 08:38:49
178.121.23.223 attack
[portscan] Port scan
2020-08-05 08:46:34
91.121.183.9 attack
91.121.183.9 - - [05/Aug/2020:01:43:04 +0100] "POST /wp-login.php HTTP/1.1" 200 6067 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
91.121.183.9 - - [05/Aug/2020:01:44:10 +0100] "POST /wp-login.php HTTP/1.1" 200 6066 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
91.121.183.9 - - [05/Aug/2020:01:45:30 +0100] "POST /wp-login.php HTTP/1.1" 200 6067 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-05 08:46:04
184.105.247.210 attackbotsspam
Unwanted checking 80 or 443 port
...
2020-08-05 12:02:41
132.232.21.175 attack
Automatic report - Banned IP Access
2020-08-05 08:36:28
106.12.196.118 attackbots
Aug  5 05:47:19 server sshd[32392]: Failed password for root from 106.12.196.118 port 44190 ssh2
Aug  5 05:52:03 server sshd[33808]: Failed password for root from 106.12.196.118 port 50794 ssh2
Aug  5 05:56:57 server sshd[35317]: Failed password for root from 106.12.196.118 port 57394 ssh2
2020-08-05 12:07:05
167.99.51.159 attackbotsspam
$f2bV_matches
2020-08-05 08:34:36
142.112.81.183 attack
Aug  5 02:12:01 dev0-dcde-rnet sshd[20801]: Failed password for root from 142.112.81.183 port 48132 ssh2
Aug  5 02:15:21 dev0-dcde-rnet sshd[20843]: Failed password for root from 142.112.81.183 port 46548 ssh2
2020-08-05 08:38:19
37.49.230.229 attackbotsspam
22/tcp
[2020-08-04]1pkt
2020-08-05 08:48:45
156.236.72.149 attack
Aug  5 07:24:41 localhost sshd[971571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.236.72.149  user=root
Aug  5 07:24:43 localhost sshd[971571]: Failed password for root from 156.236.72.149 port 60520 ssh2
...
2020-08-05 08:27:54

Recently Reported IPs

6.236.13.183 220.252.113.25 2.105.30.73 55.0.172.48
14.142.238.9 45.142.92.210 200.213.5.115 92.171.46.191
81.26.136.198 146.14.11.187 106.70.166.149 122.172.129.186
235.142.126.249 189.180.2.173 173.134.181.195 6.143.149.155
155.193.77.78 135.160.117.137 12.37.7.134 229.208.156.90