Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.148.3.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58096
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.148.3.57.			IN	A

;; AUTHORITY SECTION:
.			203	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 23:35:46 CST 2022
;; MSG SIZE  rcvd: 105
Host info
57.3.148.113.in-addr.arpa domain name pointer KD113148003057.ppp-bb.dion.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.3.148.113.in-addr.arpa	name = KD113148003057.ppp-bb.dion.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.56.26.2 attackspambots
Honeypot attack, port: 445, PTR: 93-56-26-2.ip287.fastwebnet.it.
2020-01-28 05:15:08
138.68.133.227 attack
Apr 23 10:26:39 ubuntu sshd[19154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.133.227
Apr 23 10:26:41 ubuntu sshd[19154]: Failed password for invalid user ftpuser1 from 138.68.133.227 port 42718 ssh2
Apr 23 10:28:57 ubuntu sshd[19239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.133.227
2020-01-28 05:04:56
2a00:1158:2:6d00::2 attackspambots
01/27/2020-19:36:03.575079 2a00:1158:0002:6d00:0000:0000:0000:0002 Protocol: 6 SURICATA TLS invalid record/traffic
2020-01-28 05:00:54
92.75.130.48 attack
2019-10-23 16:45:55 1iNHta-0007Gu-7h SMTP connection from dslb-092-075-130-048.092.075.pools.vodafone-ip.de \[92.75.130.48\]:25558 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-10-23 16:46:09 1iNHtj-0007HF-3a SMTP connection from dslb-092-075-130-048.092.075.pools.vodafone-ip.de \[92.75.130.48\]:25649 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-10-23 16:46:12 1iNHts-0007HN-Ba SMTP connection from dslb-092-075-130-048.092.075.pools.vodafone-ip.de \[92.75.130.48\]:25723 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 05:00:40
113.119.111.56 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-28 05:26:29
189.15.204.74 attackspam
Honeypot attack, port: 81, PTR: 189-015-204-74.xd-dynamic.algarnetsuper.com.br.
2020-01-28 05:10:01
187.176.189.253 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-28 04:54:04
197.214.11.1 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-28 05:16:18
201.242.247.35 attackbotsspam
1433/tcp
[2020-01-27]1pkt
2020-01-28 05:06:00
92.45.123.50 attackspambots
2019-07-08 11:26:55 1hkPvC-0002id-EU SMTP connection from \(host-92-45-123-50.reverse.superonline.net\) \[92.45.123.50\]:50451 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 11:27:01 1hkPvI-0002ik-Dd SMTP connection from \(host-92-45-123-50.reverse.superonline.net\) \[92.45.123.50\]:3339 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-08 11:27:05 1hkPvM-0002iz-Li SMTP connection from \(host-92-45-123-50.reverse.superonline.net\) \[92.45.123.50\]:20798 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 05:24:18
92.53.78.62 attackspambots
2019-02-04 12:45:18 1gqcgg-0004Rt-C7 SMTP connection from videofor24.ru \[92.53.78.62\]:36945 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-02-04 12:45:21 1gqcgi-0004Rw-TR SMTP connection from videofor24.ru \[92.53.78.62\]:37598 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-02-04 12:49:03 1gqckJ-0004VC-3V SMTP connection from videofor24.ru \[92.53.78.62\]:56125 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 05:10:25
59.127.124.161 attackspam
Unauthorized connection attempt detected from IP address 59.127.124.161 to port 81 [J]
2020-01-28 05:29:00
92.49.196.32 attackspambots
2019-07-07 13:30:13 1hk5My-0006vL-FJ SMTP connection from \(\[92.49.196.32\]\) \[92.49.196.32\]:23732 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 13:30:29 1hk5NF-0006vc-32 SMTP connection from \(\[92.49.196.32\]\) \[92.49.196.32\]:23872 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-07-07 13:30:37 1hk5NM-0006vh-J3 SMTP connection from \(\[92.49.196.32\]\) \[92.49.196.32\]:23926 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 05:20:46
92.45.99.109 attack
2019-03-08 16:54:05 1h2Hoz-0007rA-G5 SMTP connection from \(host-92-45-99-109.reverse.superonline.net\) \[92.45.99.109\]:33120 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 16:55:00 1h2Hpp-0007si-HK SMTP connection from \(host-92-45-99-109.reverse.superonline.net\) \[92.45.99.109\]:33482 I=\[193.107.88.166\]:25 closed by DROP in ACL
2019-03-08 16:55:36 1h2HqR-0007up-IU SMTP connection from \(host-92-45-99-109.reverse.superonline.net\) \[92.45.99.109\]:33783 I=\[193.107.88.166\]:25 closed by DROP in ACL
...
2020-01-28 05:24:49
185.175.93.78 attackbotsspam
*Port Scan* detected from 185.175.93.78 (RU/Russia/-). 4 hits in the last 125 seconds
2020-01-28 05:06:33

Recently Reported IPs

36.37.157.48 154.23.209.74 177.67.53.137 216.219.81.100
156.214.229.94 89.169.31.222 1.62.138.233 102.66.170.226
163.125.211.173 181.49.176.37 175.107.246.149 120.231.201.11
91.218.19.194 171.90.118.202 14.102.56.163 219.154.175.238
176.17.236.219 122.194.229.36 170.80.200.205 205.185.120.66