Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.145.29.69
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1830
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.145.29.69.			IN	A

;; AUTHORITY SECTION:
.			319	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120200 1800 900 604800 86400

;; Query time: 122 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 02 19:08:03 CST 2019
;; MSG SIZE  rcvd: 116
Host info
69.29.145.42.in-addr.arpa domain name pointer 42-145-29-69.rev.home.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
69.29.145.42.in-addr.arpa	name = 42-145-29-69.rev.home.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.69.89.78 attack
Ssh brute force
2020-09-20 13:14:04
159.89.86.142 attack
SSH Invalid Login
2020-09-20 13:08:51
190.115.152.43 attackspambots
Unauthorized connection attempt from IP address 190.115.152.43 on Port 445(SMB)
2020-09-20 13:18:58
5.154.119.148 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 13:18:19
54.36.163.141 attack
Sep 20 06:17:42 [host] sshd[28137]: pam_unix(sshd:
Sep 20 06:17:44 [host] sshd[28137]: Failed passwor
Sep 20 06:21:43 [host] sshd[28153]: pam_unix(sshd:
2020-09-20 12:49:23
118.194.132.112 attack
invalid user
2020-09-20 13:12:11
119.165.13.173 attackspam
DATE:2020-09-19 19:02:42, IP:119.165.13.173, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-09-20 13:09:35
23.129.64.203 attackspam
2020-09-20T03:43[Censored Hostname] sshd[23591]: Failed password for root from 23.129.64.203 port 13955 ssh2
2020-09-20T03:43[Censored Hostname] sshd[23591]: Failed password for root from 23.129.64.203 port 13955 ssh2
2020-09-20T03:43[Censored Hostname] sshd[23591]: Failed password for root from 23.129.64.203 port 13955 ssh2[...]
2020-09-20 12:58:59
139.59.46.167 attackspam
B: Abusive ssh attack
2020-09-20 13:03:59
78.137.50.85 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 13:20:47
89.163.223.246 attackbots
Sep 20 06:54:05 h2829583 sshd[1449]: Failed password for root from 89.163.223.246 port 54678 ssh2
2020-09-20 13:06:58
61.64.177.60 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 12:55:28
95.248.84.50 attackspambots
Automatic report - Port Scan Attack
2020-09-20 13:19:54
115.159.237.46 attackspam
$f2bV_matches
2020-09-20 12:47:15
20.194.36.46 attack
Sep 20 11:47:14 webhost01 sshd[1145]: Failed password for root from 20.194.36.46 port 54510 ssh2
...
2020-09-20 12:53:37

Recently Reported IPs

167.46.94.49 212.64.51.45 51.254.165.202 118.172.188.195
123.21.17.211 113.57.57.169 62.225.102.234 71.210.55.14
51.73.85.46 223.224.239.177 23.203.60.217 113.115.16.38
187.19.10.117 92.220.147.146 114.33.76.122 110.32.67.123
132.232.213.228 47.80.160.223 50.253.58.234 4.108.65.94