Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shizuoka

Region: Shizuoka

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.127.154.29
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41567
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.127.154.29.			IN	A

;; AUTHORITY SECTION:
.			336	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019102701 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 28 02:21:37 CST 2019
;; MSG SIZE  rcvd: 117
Host info
29.154.127.42.in-addr.arpa domain name pointer ftth-127-154.29.dws.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
29.154.127.42.in-addr.arpa	name = ftth-127-154.29.dws.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
138.121.161.198 attackbots
Aug  8 19:28:03 ks10 sshd[3792]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.161.198 
Aug  8 19:28:05 ks10 sshd[3792]: Failed password for invalid user aria from 138.121.161.198 port 43246 ssh2
...
2019-08-09 02:44:41
113.100.196.68 attackspam
Honeypot hit.
2019-08-09 02:32:58
77.247.109.30 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-09 02:21:11
87.99.77.104 attackbotsspam
Aug  8 17:36:46 nextcloud sshd\[3967\]: Invalid user beginner from 87.99.77.104
Aug  8 17:36:46 nextcloud sshd\[3967\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.99.77.104
Aug  8 17:36:48 nextcloud sshd\[3967\]: Failed password for invalid user beginner from 87.99.77.104 port 44042 ssh2
...
2019-08-09 02:12:43
42.112.231.200 attackspam
Unauthorized connection attempt from IP address 42.112.231.200 on Port 445(SMB)
2019-08-09 01:58:52
37.49.231.104 attack
08/08/2019-12:01:29.957359 37.49.231.104 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-09 02:13:08
199.103.62.108 attackspam
3389BruteforceFW21
2019-08-09 02:48:49
120.52.152.16 attack
08/08/2019-14:06:10.688967 120.52.152.16 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-08-09 02:10:53
185.2.196.196 attackspambots
Automatic report - Banned IP Access
2019-08-09 02:02:47
138.68.92.121 attackbotsspam
Aug  8 11:59:52 thevastnessof sshd[12623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.92.121
...
2019-08-09 02:18:41
137.116.160.91 attack
[portscan] Port scan
2019-08-09 02:39:05
121.228.97.36 attackspambots
Automatic report - Port Scan Attack
2019-08-09 02:10:35
103.38.23.5 attack
firewall-block, port(s): 11278/tcp
2019-08-09 02:19:49
134.209.155.245 attackbots
08/08/2019-14:03:59.876574 134.209.155.245 Protocol: 6 ET COMPROMISED Known Compromised or Hostile Host Traffic group 4
2019-08-09 02:29:00
123.136.161.146 attackspam
2019-08-08T18:35:31.942569abusebot-6.cloudsearch.cf sshd\[27080\]: Invalid user nero from 123.136.161.146 port 47444
2019-08-09 02:50:37

Recently Reported IPs

217.68.218.128 124.170.235.251 181.168.65.93 217.68.218.127
63.50.90.104 217.68.218.13 4.15.69.221 217.68.218.126
94.14.23.116 12.199.169.72 122.212.231.107 217.68.218.107
187.212.54.198 122.251.34.111 217.68.217.96 91.91.1.224
35.221.146.221 217.68.217.93 85.2.139.31 162.144.70.210