Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ichihara

Region: Chiba

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 133.213.148.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 53949
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;133.213.148.2.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091700 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 17 23:09:32 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 2.148.213.133.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 2.148.213.133.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
41.44.215.76 attackbots
Port Scan: TCP/23
2019-09-20 22:29:37
37.6.107.253 attackbotsspam
Port Scan: TCP/8080
2019-09-20 22:30:12
192.110.219.166 attackspambots
Port Scan: UDP/137
2019-09-20 22:08:33
178.128.21.38 attackbotsspam
Sep 20 15:57:54 rpi sshd[3455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.21.38 
Sep 20 15:57:56 rpi sshd[3455]: Failed password for invalid user password from 178.128.21.38 port 40412 ssh2
2019-09-20 22:10:19
24.211.149.120 attackspam
Port Scan: UDP/6641
2019-09-20 22:02:23
63.236.96.20 attackspam
Port Scan: UDP/137
2019-09-20 22:29:10
195.69.237.233 attackbots
Port Scan: TCP/443
2019-09-20 22:34:43
23.89.122.130 attackspam
Port Scan: TCP/445
2019-09-20 22:23:18
196.52.43.95 attackspam
2019-07-31T05:10:38.454Z CLOSE host=196.52.43.95 port=43295 fd=4 time=20.020 bytes=10
...
2019-09-20 22:25:09
191.253.104.11 attack
Port Scan: TCP/34567
2019-09-20 22:35:07
120.199.105.9 attack
Port Scan: TCP/23
2019-09-20 22:14:04
120.205.61.14 attackbots
Port Scan: TCP/21
2019-09-20 21:46:50
172.3.248.46 attackbotsspam
Port Scan: UDP/1999
2019-09-20 22:10:35
196.52.43.98 attackspambots
Aug 13 09:55:44 mercury kernel: [UFW ALLOW] IN=eth0 OUT= MAC=f2:3c:91:bc:4d:f8:84:78:ac:5a:1a:41:08:00 SRC=196.52.43.98 DST=109.74.200.221 LEN=76 TOS=0x00 PREC=0x00 TTL=250 ID=54321 PROTO=UDP SPT=65137 DPT=123 LEN=56 
...
2019-09-20 22:08:04
68.216.179.206 attack
Port Scan: TCP/445
2019-09-20 21:56:09

Recently Reported IPs

114.233.222.168 243.167.23.158 248.41.212.5 149.254.56.102
135.109.43.144 210.145.163.4 119.121.135.81 161.44.38.9
237.126.60.181 106.67.242.46 175.246.113.159 250.86.25.20
211.234.151.243 212.13.45.35 178.116.181.53 164.222.213.80
5.186.122.217 162.144.126.104 173.240.248.38 151.172.210.203