Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 126.199.114.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52746
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;126.199.114.148.		IN	A

;; AUTHORITY SECTION:
.			482	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122901 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 30 01:18:28 CST 2021
;; MSG SIZE  rcvd: 108
Host info
148.114.199.126.in-addr.arpa domain name pointer pw126199114148.18.panda-world.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.114.199.126.in-addr.arpa	name = pw126199114148.18.panda-world.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.112.206.233 attackspam
Website hacking attempt: Improper php file access [php file]
2020-02-16 16:32:25
171.240.159.91 attack
unauthorized connection attempt
2020-02-16 16:16:38
190.104.238.34 attack
unauthorized connection attempt
2020-02-16 16:02:44
114.35.92.31 attack
unauthorized connection attempt
2020-02-16 16:42:22
190.119.190.122 attackspambots
Feb 16 08:35:25 plex sshd[16244]: Invalid user khonda from 190.119.190.122 port 60316
2020-02-16 15:57:16
49.36.52.64 attackbotsspam
unauthorized connection attempt
2020-02-16 16:19:25
168.194.160.47 attackspam
Feb 16 09:38:17 dedicated sshd[24881]: Invalid user noah from 168.194.160.47 port 32672
2020-02-16 16:44:47
86.122.152.159 attack
unauthorized connection attempt
2020-02-16 16:12:35
132.145.131.67 attackspam
Feb 12 22:30:29 hgb10301 sshd[10104]: Invalid user jay from 132.145.131.67 port 51912
Feb 12 22:30:31 hgb10301 sshd[10104]: Failed password for invalid user jay from 132.145.131.67 port 51912 ssh2
Feb 12 22:30:32 hgb10301 sshd[10104]: Received disconnect from 132.145.131.67 port 51912:11: Bye Bye [preauth]
Feb 12 22:30:32 hgb10301 sshd[10104]: Disconnected from 132.145.131.67 port 51912 [preauth]
Feb 12 22:35:35 hgb10301 sshd[10323]: Invalid user rozana from 132.145.131.67 port 57126
Feb 12 22:35:37 hgb10301 sshd[10323]: Failed password for invalid user rozana from 132.145.131.67 port 57126 ssh2
Feb 12 22:35:37 hgb10301 sshd[10323]: Received disconnect from 132.145.131.67 port 57126:11: Bye Bye [preauth]
Feb 12 22:35:37 hgb10301 sshd[10323]: Disconnected from 132.145.131.67 port 57126 [preauth]
Feb 12 22:36:42 hgb10301 sshd[10378]: Invalid user django from 132.145.131.67 port 40848
Feb 12 22:36:44 hgb10301 sshd[10378]: Failed password for invalid user django from 132.14........
-------------------------------
2020-02-16 16:45:24
176.12.70.70 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-16 15:57:41
202.86.128.19 attackspambots
Honeypot attack, port: 81, PTR: n20286z128l19.static.ctmip.net.
2020-02-16 16:26:23
49.235.91.59 attack
Feb 16 09:08:36 dedicated sshd[19133]: Invalid user www from 49.235.91.59 port 40890
2020-02-16 16:29:41
1.165.175.239 attack
unauthorized connection attempt
2020-02-16 16:29:59
113.195.137.95 attackbots
unauthorized connection attempt
2020-02-16 16:28:55
132.232.112.25 attackbotsspam
Invalid user demo from 132.232.112.25 port 43406
2020-02-16 16:36:51

Recently Reported IPs

123.33.54.59 93.204.133.54 101.165.130.154 247.16.100.14
246.52.222.209 164.19.110.196 104.67.205.225 225.159.39.241
229.253.114.146 30.143.104.173 112.170.143.106 201.104.208.188
40.214.8.35 14.25.196.19 224.149.2.45 87.230.87.37
131.60.150.138 187.135.42.174 76.136.147.72 3.53.168.129