Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: Jupiter Telecommunication Co. Ltd

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 42.149.23.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59910
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;42.149.23.94.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071301 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sun Jul 14 03:56:28 CST 2019
;; MSG SIZE  rcvd: 116
Host info
94.23.149.42.in-addr.arpa domain name pointer 42-149-23-94.rev.home.ne.jp.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
94.23.149.42.in-addr.arpa	name = 42-149-23-94.rev.home.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.33.31.239 attackspambots
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-03 23:00:32
185.176.27.254 attackspam
11/03/2019-09:42:53.111000 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-03 22:43:26
118.70.13.126 attackbots
Unauthorized connection attempt from IP address 118.70.13.126 on Port 445(SMB)
2019-11-03 22:40:50
27.64.96.178 attackbotsspam
TELNET bruteforce
2019-11-03 22:51:45
51.254.220.20 attack
Nov  3 08:14:53 Ubuntu-1404-trusty-64-minimal sshd\[4545\]: Invalid user gitolite2 from 51.254.220.20
Nov  3 08:14:53 Ubuntu-1404-trusty-64-minimal sshd\[4545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20
Nov  3 08:14:55 Ubuntu-1404-trusty-64-minimal sshd\[4545\]: Failed password for invalid user gitolite2 from 51.254.220.20 port 33897 ssh2
Nov  3 08:25:45 Ubuntu-1404-trusty-64-minimal sshd\[12805\]: Invalid user gitolite2 from 51.254.220.20
Nov  3 08:25:45 Ubuntu-1404-trusty-64-minimal sshd\[12805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.254.220.20
2019-11-03 22:35:02
185.175.93.19 attack
Nov  3 15:21:48 mc1 kernel: \[4077217.935794\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.19 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=41322 PROTO=TCP SPT=41749 DPT=3224 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  3 15:23:07 mc1 kernel: \[4077296.709271\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.19 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=54823 PROTO=TCP SPT=41749 DPT=3777 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  3 15:25:33 mc1 kernel: \[4077442.361588\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:11:a9:7b:d2:74:7f:6e:37:e3:08:00 SRC=185.175.93.19 DST=159.69.205.51 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=45902 PROTO=TCP SPT=41749 DPT=3588 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2019-11-03 22:36:41
200.129.207.164 attack
Nov  3 16:34:16 sauna sshd[203138]: Failed password for root from 200.129.207.164 port 54310 ssh2
...
2019-11-03 22:54:35
45.82.153.133 attack
Nov  3 15:16:50 localhost postfix/smtpd\[24513\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  3 15:17:13 localhost postfix/smtpd\[24524\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  3 15:18:35 localhost postfix/smtpd\[24513\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  3 15:19:00 localhost postfix/smtpd\[24602\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov  3 15:26:04 localhost postfix/smtpd\[24778\]: warning: unknown\[45.82.153.133\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-03 22:34:46
101.91.217.94 attackspambots
Nov  3 15:32:37 sd-53420 sshd\[8010\]: Invalid user paul from 101.91.217.94
Nov  3 15:32:37 sd-53420 sshd\[8010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.217.94
Nov  3 15:32:39 sd-53420 sshd\[8010\]: Failed password for invalid user paul from 101.91.217.94 port 48014 ssh2
Nov  3 15:38:18 sd-53420 sshd\[8400\]: User root from 101.91.217.94 not allowed because none of user's groups are listed in AllowGroups
Nov  3 15:38:18 sd-53420 sshd\[8400\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.91.217.94  user=root
...
2019-11-03 22:51:07
139.155.83.98 attackspam
Nov  3 14:38:11 MK-Soft-VM5 sshd[3610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.155.83.98 
Nov  3 14:38:13 MK-Soft-VM5 sshd[3610]: Failed password for invalid user zhaobin from 139.155.83.98 port 58078 ssh2
...
2019-11-03 22:26:32
76.124.165.19 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/76.124.165.19/ 
 
 US - 1H : (237)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN7922 
 
 IP : 76.124.165.19 
 
 CIDR : 76.96.0.0/11 
 
 PREFIX COUNT : 1512 
 
 UNIQUE IP COUNT : 70992640 
 
 
 ATTACKS DETECTED ASN7922 :  
  1H - 3 
  3H - 6 
  6H - 10 
 12H - 15 
 24H - 31 
 
 DateTime : 2019-11-03 06:43:43 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-03 22:20:37
188.143.91.142 attack
Nov  3 17:20:29 server sshd\[31331\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188-143-91-142.pool.digikabel.hu  user=root
Nov  3 17:20:31 server sshd\[31331\]: Failed password for root from 188.143.91.142 port 57504 ssh2
Nov  3 17:34:20 server sshd\[2589\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188-143-91-142.pool.digikabel.hu  user=root
Nov  3 17:34:22 server sshd\[2589\]: Failed password for root from 188.143.91.142 port 42655 ssh2
Nov  3 17:38:12 server sshd\[3722\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188-143-91-142.pool.digikabel.hu  user=root
...
2019-11-03 22:53:41
103.205.177.229 attackspambots
Unauthorized connection attempt from IP address 103.205.177.229 on Port 445(SMB)
2019-11-03 22:41:16
187.199.237.171 attack
$f2bV_matches
2019-11-03 22:18:57
45.136.110.26 attackbotsspam
Nov  3 14:48:18 h2177944 kernel: \[5664578.086726\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.26 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=34246 PROTO=TCP SPT=48163 DPT=16491 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  3 15:06:14 h2177944 kernel: \[5665653.938449\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.26 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=12587 PROTO=TCP SPT=48163 DPT=51791 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  3 15:21:22 h2177944 kernel: \[5666562.008222\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.26 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=34477 PROTO=TCP SPT=48163 DPT=23191 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  3 15:36:47 h2177944 kernel: \[5667487.365720\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.26 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=44574 PROTO=TCP SPT=48163 DPT=10591 WINDOW=1024 RES=0x00 SYN URGP=0 
Nov  3 15:43:13 h2177944 kernel: \[5667873.013309\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.110.26 DST=85.214.1
2019-11-03 22:43:51

Recently Reported IPs

134.121.158.52 110.105.6.139 76.158.109.1 64.143.21.202
124.130.86.209 129.15.87.77 73.30.29.73 124.56.144.166
168.83.75.204 222.29.37.228 118.70.171.54 67.211.129.58
122.246.234.230 118.110.192.35 70.209.53.198 139.129.27.87
194.190.93.129 149.163.243.211 2600:1001:b108:8c3c:3cf2:287b:21d:aedb 14.117.118.134