Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fujiyoshida

Region: Yamanasi (Yamanashi)

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.144.241.147
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46580
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;42.144.241.147.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 10:59:32 CST 2025
;; MSG SIZE  rcvd: 107
Host info
147.241.144.42.in-addr.arpa domain name pointer 42-144-241-147.rev.home.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
147.241.144.42.in-addr.arpa	name = 42-144-241-147.rev.home.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
109.195.238.153 attackspam
8080/tcp
[2020-04-08]1pkt
2020-04-09 04:35:59
2a01:7e00::f03c:92ff:fe60:6df6 attack
5901/tcp
[2020-04-08]1pkt
2020-04-09 04:03:53
61.216.131.31 attack
Apr  8 19:30:06 mail sshd[30508]: Invalid user admin from 61.216.131.31
Apr  8 19:30:06 mail sshd[30508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.216.131.31
Apr  8 19:30:06 mail sshd[30508]: Invalid user admin from 61.216.131.31
Apr  8 19:30:08 mail sshd[30508]: Failed password for invalid user admin from 61.216.131.31 port 44176 ssh2
Apr  8 19:35:52 mail sshd[31223]: Invalid user samp from 61.216.131.31
...
2020-04-09 04:37:24
134.122.114.80 attackbots
2020-04-08T13:34:08Z - RDP login failed multiple times. (134.122.114.80)
2020-04-09 04:11:43
173.243.136.110 attack
Mr.Andy Roy Joe
	ATTENTION:Notice On ­Your Consignment Box­ reg #: HG1N8875B2.
(gw6110.fortimail.com [173.243.136.110])
2020-04-09 04:23:46
221.148.45.168 attackbotsspam
Apr  8 17:27:09 sigma sshd\[29179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.148.45.168  user=rootApr  8 17:39:31 sigma sshd\[29673\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.148.45.168
...
2020-04-09 04:07:37
2604:a880:400:d1::6ab:e001 attackspambots
Honeypot attack, port: 7, PTR: do-prod-us-east-burner-0402-2.do.binaryedge.ninja.
2020-04-09 04:10:36
220.133.135.207 attackspam
23/tcp
[2020-04-08]1pkt
2020-04-09 04:18:59
46.119.149.140 attackspam
1586349372 - 04/08/2020 14:36:12 Host: 46.119.149.140/46.119.149.140 Port: 445 TCP Blocked
2020-04-09 04:17:39
138.68.99.46 attackspam
Automatic report - Banned IP Access
2020-04-09 04:32:09
109.61.51.231 attack
23/tcp
[2020-04-08]1pkt
2020-04-09 04:18:42
78.87.74.113 attackspambots
23/tcp
[2020-04-08]1pkt
2020-04-09 04:32:31
170.79.83.228 attackspam
Automatic report - Port Scan Attack
2020-04-09 04:15:08
189.84.68.60 attackbots
445/tcp
[2020-04-08]1pkt
2020-04-09 04:38:33
124.122.104.18 attackbotsspam
9530/tcp
[2020-04-08]1pkt
2020-04-09 04:29:49

Recently Reported IPs

223.94.92.157 109.229.139.197 64.50.243.224 100.44.92.161
184.18.14.54 175.167.75.245 246.7.38.18 247.220.6.235
92.91.5.89 161.29.50.203 58.179.130.64 53.67.216.236
234.38.238.233 141.198.177.183 97.198.129.177 6.53.88.194
209.42.48.65 152.5.158.188 211.203.56.52 14.174.165.1