Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.1.220.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38296
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.1.220.148.			IN	A

;; AUTHORITY SECTION:
.			257	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 11:30:19 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 148.220.1.131.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.220.1.131.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.72.144.228 attackbotsspam
Invalid user nas from 103.72.144.228 port 48750
2020-09-03 15:51:48
174.243.83.11 attackspambots
Brute forcing email accounts
2020-09-03 15:32:32
125.167.252.65 attackbotsspam
Automatic report - Port Scan Attack
2020-09-03 15:32:45
14.238.9.98 attack
Unauthorized connection attempt from IP address 14.238.9.98 on Port 445(SMB)
2020-09-03 15:20:54
185.25.177.10 attackspam
Attempted connection to port 445.
2020-09-03 15:45:12
106.54.112.173 attackspambots
Invalid user dummy from 106.54.112.173 port 40786
2020-09-03 15:19:19
80.82.68.218 attackbots
Attempted connection to port 3389.
2020-09-03 15:30:16
5.145.229.129 attackbots
Attempted connection to port 445.
2020-09-03 15:34:53
134.209.41.198 attack
*Port Scan* detected from 134.209.41.198 (US/United States/California/Bakersfield/-). 4 hits in the last 250 seconds
2020-09-03 15:50:41
91.121.137.24 attack
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-09-03 15:27:23
222.174.57.170 attackbots
 TCP (SYN) 222.174.57.170:57129 -> port 445, len 52
2020-09-03 15:22:45
95.71.224.160 attackspambots
Attempted connection to port 445.
2020-09-03 15:29:49
118.24.30.97 attackbotsspam
Invalid user adriano from 118.24.30.97 port 46592
2020-09-03 15:29:33
129.250.206.86 attackspam
 UDP 129.250.206.86:8920 -> port 53, len 75
2020-09-03 15:38:15
186.95.210.106 attackspambots
186.95.210.106 - - \[02/Sep/2020:19:45:16 +0300\] "POST /xmlrpc.php HTTP/1.1" 301 178 "-" "Mozilla/5.0 \(Windows NT 6.2\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/28.0.1467.0 Safari/537.36" "-"
186.95.210.106 - - \[02/Sep/2020:19:45:29 +0300\] "POST /wordpress/xmlrpc.php HTTP/1.1" 301 178 "-" "Mozilla/5.0 \(Windows NT 6.2\) AppleWebKit/537.36 \(KHTML, like Gecko\) Chrome/28.0.1467.0 Safari/537.36" "-"
...
2020-09-03 15:52:53

Recently Reported IPs

120.34.56.237 98.204.127.160 171.62.178.95 8.92.28.215
235.136.7.58 207.180.12.243 36.138.197.204 212.86.192.237
55.252.126.99 94.80.210.105 119.81.203.236 239.72.194.213
240.109.1.251 18.32.73.16 93.112.28.169 185.148.0.179
25.132.1.92 129.96.215.254 58.47.210.57 226.58.106.249