Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lusaka

Region: Lusaka Province

Country: Zambia

Internet Service Provider: Airtel

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 102.148.228.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9174
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;102.148.228.133.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062800 1800 900 604800 86400

;; Query time: 78 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jun 28 20:59:44 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 133.228.148.102.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.228.148.102.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.248.168.217 attackbotsspam
02/09/2020-04:16:52.278575 89.248.168.217 Protocol: 17 ET DROP Dshield Block Listed Source group 1
2020-02-09 18:00:47
27.254.130.60 attackbotsspam
Feb  6 22:27:23 HOST sshd[24045]: Failed password for invalid user kwy from 27.254.130.60 port 52469 ssh2
Feb  6 22:27:24 HOST sshd[24045]: Received disconnect from 27.254.130.60: 11: Bye Bye [preauth]
Feb  6 22:32:23 HOST sshd[24215]: Failed password for invalid user tsn from 27.254.130.60 port 49784 ssh2
Feb  6 22:32:24 HOST sshd[24215]: Received disconnect from 27.254.130.60: 11: Bye Bye [preauth]
Feb  6 22:34:52 HOST sshd[24298]: Failed password for invalid user eqg from 27.254.130.60 port 34565 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=27.254.130.60
2020-02-09 18:14:25
192.241.200.170 attackbots
Port 8888 scan denied
2020-02-09 18:39:42
78.128.113.186 attack
20 attempts against mh-misbehave-ban on sonic
2020-02-09 18:06:32
36.227.10.126 attackbots
port scan and connect, tcp 23 (telnet)
2020-02-09 18:50:32
159.89.134.64 attackspambots
Automatic report - Banned IP Access
2020-02-09 18:39:59
77.87.19.101 attack
Automatic report - Port Scan
2020-02-09 18:48:03
23.129.64.152 attack
scan r
2020-02-09 18:21:04
45.173.179.88 attackspambots
Telnet/23 MH Probe, BF, Hack -
2020-02-09 18:28:05
62.60.140.21 attackspam
$f2bV_matches
2020-02-09 18:40:30
51.255.109.162 attackspambots
unauthorized connection attempt
2020-02-09 17:59:42
117.50.34.131 attackbots
Feb  9 09:08:13 mout sshd[31422]: Invalid user zic from 117.50.34.131 port 52356
2020-02-09 18:08:12
162.158.107.119 attackspambots
162.158.107.119 - - [09/Feb/2020:11:51:10 +0700] "GET /apple-touch-icon.png HTTP/1.1" 404 2828 "-" "Googlebot-Image/1.0"
2020-02-09 18:32:06
222.186.31.83 attackspambots
Feb  9 05:15:34 plusreed sshd[9310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Feb  9 05:15:36 plusreed sshd[9310]: Failed password for root from 222.186.31.83 port 11735 ssh2
...
2020-02-09 18:21:39
60.27.197.66 attackbotsspam
ssh intrusion attempt
2020-02-09 18:03:22

Recently Reported IPs

118.211.150.61 22.73.230.126 153.43.215.223 14.113.57.223
196.144.110.186 10.62.98.91 102.137.69.34 113.15.177.242
113.103.148.207 107.102.240.7 8.194.172.33 59.61.122.5
21.111.137.148 106.95.134.66 1.243.62.97 28.193.236.195
58.204.224.43 142.10.89.170 45.156.128.39 57.60.192.160