Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Utsunomiya

Region: Totigi (Tochigi)

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 222.145.142.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 392
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;222.145.142.141.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 08:13:40 CST 2025
;; MSG SIZE  rcvd: 108
Host info
141.142.145.222.in-addr.arpa domain name pointer p12270141-ipxg45001marunouchi.tokyo.ocn.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
141.142.145.222.in-addr.arpa	name = p12270141-ipxg45001marunouchi.tokyo.ocn.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
58.243.125.108 attackbotsspam
Port Scan detected!
...
2020-07-17 04:10:13
180.76.108.118 attack
Jul 16 19:53:01 rancher-0 sshd[383603]: Invalid user cod from 180.76.108.118 port 54366
...
2020-07-17 04:28:06
51.75.23.214 attack
REQUESTED PAGE: /wp-login.php
2020-07-17 04:08:14
13.68.252.36 attackspam
Jul 16 18:56:35 *hidden* sshd[53564]: Failed password for *hidden* from 13.68.252.36 port 37250 ssh2
2020-07-17 03:56:20
40.73.3.2 attackspam
Fail2Ban
2020-07-17 04:20:18
208.91.198.55 attackbotsspam
Phishing Website
2020-07-17 04:01:05
190.92.4.231 attack
1594907057 - 07/16/2020 15:44:17 Host: 190.92.4.231/190.92.4.231 Port: 23 TCP Blocked
2020-07-17 04:34:17
63.82.54.211 attackbotsspam
Postfix RBL failed
2020-07-17 04:34:36
218.146.20.61 attackbots
SSH Brute-Force. Ports scanning.
2020-07-17 04:14:58
85.209.0.101 attack
Jul 16 09:30:55 scw-tender-jepsen sshd[9246]: Failed password for root from 85.209.0.101 port 22340 ssh2
2020-07-17 04:33:49
157.245.91.72 attackspambots
$f2bV_matches
2020-07-17 04:04:57
52.188.61.75 attack
k+ssh-bruteforce
2020-07-17 04:32:43
115.127.82.138 attack
1594907089 - 07/16/2020 15:44:49 Host: 115.127.82.138/115.127.82.138 Port: 445 TCP Blocked
2020-07-17 04:09:27
51.81.34.227 attackspambots
2020-07-16T20:28:52+0200 Failed SSH Authentication/Brute Force Attack. (Server 4)
2020-07-17 04:19:54
51.38.190.237 attackspam
C1,WP GET /manga/wp-login.php
2020-07-17 04:32:23

Recently Reported IPs

166.207.212.125 48.215.48.254 85.238.25.87 5.224.7.171
232.68.54.30 25.28.243.158 227.206.212.82 8.147.124.236
65.217.161.174 201.104.206.180 49.83.39.103 95.252.193.228
208.41.197.3 125.174.193.137 81.11.20.72 216.93.47.157
200.86.83.111 231.36.141.42 240.126.113.138 62.59.178.177