Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.49.148.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 65303
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;136.49.148.221.			IN	A

;; AUTHORITY SECTION:
.			315	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020051000 1800 900 604800 86400

;; Query time: 95 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 10 21:37:27 CST 2020
;; MSG SIZE  rcvd: 118
Host info
Host 221.148.49.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.148.49.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.55.167.58 attack
Bruteforce detected by fail2ban
2020-07-17 18:07:19
187.120.134.240 attackspam
Suspicious access to SMTP/POP/IMAP services.
2020-07-17 17:45:52
119.96.157.188 attack
Invalid user xzw from 119.96.157.188 port 35188
2020-07-17 17:50:28
106.13.238.73 attackbotsspam
Port scan denied
2020-07-17 18:04:31
46.101.137.182 attackspam
Jul 17 09:09:00 ns382633 sshd\[10799\]: Invalid user kmw from 46.101.137.182 port 39812
Jul 17 09:09:00 ns382633 sshd\[10799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.137.182
Jul 17 09:09:02 ns382633 sshd\[10799\]: Failed password for invalid user kmw from 46.101.137.182 port 39812 ssh2
Jul 17 09:27:13 ns382633 sshd\[14115\]: Invalid user bsp from 46.101.137.182 port 50316
Jul 17 09:27:13 ns382633 sshd\[14115\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.137.182
2020-07-17 17:35:33
66.249.66.141 attack
Automatic report - Banned IP Access
2020-07-17 18:01:41
200.25.159.114 attack
Automatic report - XMLRPC Attack
2020-07-17 17:39:46
124.156.132.183 attackspambots
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.132.183
Invalid user eyez from 124.156.132.183 port 25176
Failed password for invalid user eyez from 124.156.132.183 port 25176 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.132.183  user=sync
Failed password for sync from 124.156.132.183 port 32986 ssh2
2020-07-17 18:10:09
78.140.7.9 attackspam
2020-07-16 03:37:17 Unauthorized connection attempt to IMAP/POP
2020-07-17 17:45:02
93.174.93.31 attack
firewall-block, port(s): 18007/tcp, 18061/tcp, 18067/tcp, 18074/tcp, 18077/tcp, 18115/tcp, 18136/tcp, 18178/tcp, 18222/tcp, 18242/tcp, 18243/tcp, 18265/tcp, 18344/tcp, 18354/tcp, 18356/tcp, 18357/tcp, 18376/tcp, 18398/tcp, 18408/tcp, 18478/tcp, 18479/tcp, 18506/tcp, 18544/tcp, 18603/tcp, 18609/tcp, 18618/tcp, 18620/tcp, 18621/tcp, 18624/tcp, 18695/tcp, 18814/tcp, 18861/tcp, 18888/tcp, 18927/tcp, 18960/tcp
2020-07-17 18:01:19
223.113.74.54 attack
2020-07-17T09:30:21.678699mail.standpoint.com.ua sshd[7972]: Invalid user global from 223.113.74.54 port 39848
2020-07-17T09:30:21.681843mail.standpoint.com.ua sshd[7972]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.113.74.54
2020-07-17T09:30:21.678699mail.standpoint.com.ua sshd[7972]: Invalid user global from 223.113.74.54 port 39848
2020-07-17T09:30:23.562849mail.standpoint.com.ua sshd[7972]: Failed password for invalid user global from 223.113.74.54 port 39848 ssh2
2020-07-17T09:32:56.194352mail.standpoint.com.ua sshd[8298]: Invalid user web from 223.113.74.54 port 50612
...
2020-07-17 17:48:59
103.207.11.10 attackspam
2020-07-17T03:27:58.457829linuxbox-skyline sshd[37352]: Invalid user won from 103.207.11.10 port 56670
...
2020-07-17 17:44:42
103.98.17.10 attack
(sshd) Failed SSH login from 103.98.17.10 (TW/Taiwan/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jul 17 05:26:02 localhost sshd[9573]: Invalid user www from 103.98.17.10 port 49776
Jul 17 05:26:04 localhost sshd[9573]: Failed password for invalid user www from 103.98.17.10 port 49776 ssh2
Jul 17 05:37:54 localhost sshd[10345]: Invalid user pen from 103.98.17.10 port 43872
Jul 17 05:37:56 localhost sshd[10345]: Failed password for invalid user pen from 103.98.17.10 port 43872 ssh2
Jul 17 05:42:39 localhost sshd[10643]: Invalid user syftp from 103.98.17.10 port 58902
2020-07-17 18:08:28
178.32.221.225 attackbotsspam
$f2bV_matches
2020-07-17 17:56:37
5.62.18.57 attackspam
0,28-02/30 [bc03/m50] PostRequest-Spammer scoring: essen
2020-07-17 17:34:36

Recently Reported IPs

213.21.174.81 125.165.76.253 35.234.101.128 27.222.54.63
186.249.211.212 31.206.174.117 211.75.202.208 174.204.73.16
152.0.198.78 150.180.113.248 220.156.163.247 162.243.139.103
94.249.211.155 197.255.160.225 209.141.41.138 73.62.252.237
49.159.185.58 103.139.219.20 54.37.159.45 78.153.108.216