Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Nukuiminamicho

Region: Tokyo

Country: Japan

Internet Service Provider: NTT docomo

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 146.99.122.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18493
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;146.99.122.48.			IN	A

;; AUTHORITY SECTION:
.			148	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023010402 1800 900 604800 86400

;; Query time: 82 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 05 05:04:40 CST 2023
;; MSG SIZE  rcvd: 106
Host info
48.122.99.146.in-addr.arpa domain name pointer mo146-99-122-48.air.mopera.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.122.99.146.in-addr.arpa	name = mo146-99-122-48.air.mopera.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.8 attackbots
Apr 23 18:43:20 NPSTNNYC01T sshd[19447]: Failed password for root from 222.186.180.8 port 18088 ssh2
Apr 23 18:43:30 NPSTNNYC01T sshd[19447]: Failed password for root from 222.186.180.8 port 18088 ssh2
Apr 23 18:43:33 NPSTNNYC01T sshd[19447]: Failed password for root from 222.186.180.8 port 18088 ssh2
Apr 23 18:43:33 NPSTNNYC01T sshd[19447]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 18088 ssh2 [preauth]
...
2020-04-24 06:56:11
123.235.36.26 attack
Invalid user cc from 123.235.36.26 port 27316
2020-04-24 06:36:27
202.137.10.186 attackspam
Invalid user gi from 202.137.10.186 port 42606
2020-04-24 07:11:18
103.95.228.2 attackbotsspam
1587659983 - 04/23/2020 18:39:43 Host: 103.95.228.2/103.95.228.2 Port: 445 TCP Blocked
2020-04-24 06:50:49
145.239.82.192 attackbots
Invalid user oracle from 145.239.82.192 port 54108
2020-04-24 06:48:57
52.168.77.91 attack
Repeated RDP login failures. Last user: administrator
2020-04-24 07:10:57
61.133.232.249 attackbotsspam
Invalid user test from 61.133.232.249 port 61460
2020-04-24 07:16:06
176.106.47.39 attackspambots
Trying ports that it shouldn't be.
2020-04-24 07:14:26
121.234.98.10 attackbotsspam
Port probing on unauthorized port 1433
2020-04-24 07:02:41
13.81.41.206 attack
RDP Bruteforce
2020-04-24 07:11:52
51.38.57.199 attackspam
Detected by Maltrail
2020-04-24 06:56:55
45.41.181.214 attack
Too many 404s, searching for vulnerabilities
2020-04-24 07:13:40
35.241.72.43 attack
Port scan(s) denied
2020-04-24 06:39:03
178.33.45.156 attackbots
Invalid user qr from 178.33.45.156 port 54618
2020-04-24 07:02:26
45.227.254.30 attackspambots
Port scan(s) denied
2020-04-24 06:39:15

Recently Reported IPs

149.210.126.136 146.196.45.34 145.132.112.202 14.231.148.66
139.4.225.164 138.221.226.205 137.60.241.119 135.220.212.165
134.23.250.24 133.11.254.113 133.104.16.231 133.219.207.108
131.153.31.60 126.54.209.170 127.17.117.128 125.118.220.251
123.254.127.68 124.178.9.216 117.230.32.219 117.138.93.88