Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nagoya

Region: Aichi

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.168.198.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60530
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.168.198.148.		IN	A

;; AUTHORITY SECTION:
.			516	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020601 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 12:13:03 CST 2022
;; MSG SIZE  rcvd: 108
Host info
148.198.168.111.in-addr.arpa domain name pointer FL1-111-168-198-148.aic.mesh.ad.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.198.168.111.in-addr.arpa	name = FL1-111-168-198-148.aic.mesh.ad.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
151.80.42.186 attackspambots
Invalid user hadoop from 151.80.42.186 port 41512
2020-04-22 07:37:39
45.122.223.198 attack
45.122.223.198 - - \[21/Apr/2020:22:27:59 +0200\] "POST /wp-login.php HTTP/1.0" 200 5908 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.122.223.198 - - \[21/Apr/2020:22:28:03 +0200\] "POST /wp-login.php HTTP/1.0" 200 5721 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
45.122.223.198 - - \[21/Apr/2020:22:28:05 +0200\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-04-22 07:23:50
196.202.62.117 attack
Brute Force
2020-04-22 07:21:36
36.156.157.227 attackspambots
Apr 22 00:55:21 master sshd[17323]: Failed password for root from 36.156.157.227 port 56200 ssh2
Apr 22 01:37:41 master sshd[17443]: Failed password for root from 36.156.157.227 port 41814 ssh2
Apr 22 01:44:27 master sshd[17465]: Failed password for root from 36.156.157.227 port 33875 ssh2
Apr 22 01:48:56 master sshd[17490]: Failed password for root from 36.156.157.227 port 47406 ssh2
2020-04-22 07:23:26
49.231.35.39 attack
Apr 21 21:25:48 : SSH login attempts with invalid user
2020-04-22 07:36:17
92.118.160.1 attack
Apr 22 00:10:44 debian-2gb-nbg1-2 kernel: \[9766000.487171\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=92.118.160.1 DST=195.201.40.59 LEN=44 TOS=0x00 PREC=0x00 TTL=240 ID=54321 PROTO=TCP SPT=60396 DPT=9983 WINDOW=65535 RES=0x00 SYN URGP=0
2020-04-22 07:38:13
160.20.187.138 attackbots
Unauthorized IMAP connection attempt
2020-04-22 07:25:03
104.237.240.230 attackspambots
failed_logins
2020-04-22 12:09:25
106.13.230.238 attack
Apr 21 23:40:33 server sshd[10139]: Failed password for invalid user er from 106.13.230.238 port 50174 ssh2
Apr 21 23:58:04 server sshd[22791]: Failed password for root from 106.13.230.238 port 41826 ssh2
Apr 22 00:01:54 server sshd[6286]: Failed password for root from 106.13.230.238 port 35196 ssh2
2020-04-22 07:40:24
212.92.106.176 attack
Мaкe Mоnеу 10000$ Per Dау With Bitcoin: http://pljrga.prodivorce.org/48d18
2020-04-22 07:39:40
152.32.187.172 attack
Brute force attempt
2020-04-22 07:19:14
195.54.167.57 attack
" "
2020-04-22 12:01:36
111.95.19.61 attack
Apr 22 03:57:47 *** sshd[21250]: User root from 111.95.19.61 not allowed because not listed in AllowUsers
2020-04-22 12:08:19
81.213.150.156 attackbots
Automatic report - Port Scan Attack
2020-04-22 12:00:26
186.29.69.196 attackbots
Invalid user ic from 186.29.69.196 port 40818
2020-04-22 07:17:33

Recently Reported IPs

47.99.59.156 27.45.35.51 74.218.72.196 136.185.7.175
125.44.15.116 200.87.180.66 185.220.101.78 67.201.35.147
60.20.71.234 192.241.209.166 138.122.37.66 141.98.10.63
187.163.164.69 110.138.243.202 185.15.148.165 120.28.225.189
91.200.115.129 122.168.123.136 201.242.123.9 14.207.176.201