Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Dominican Republic

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.101.82.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2508
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.101.82.234.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:40:03 CST 2022
;; MSG SIZE  rcvd: 107
Host info
234.82.101.148.in-addr.arpa domain name pointer 234.82.101.148.d.dyn.claro.net.do.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
234.82.101.148.in-addr.arpa	name = 234.82.101.148.d.dyn.claro.net.do.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
197.50.180.117 attackbotsspam
Unauthorized connection attempt detected from IP address 197.50.180.117 to port 22 [J]
2020-01-18 04:56:03
144.217.7.75 attackspambots
Invalid user administrador from 144.217.7.75 port 33474
2020-01-18 05:08:57
118.44.140.48 attackbotsspam
20/1/17@16:12:59: FAIL: IoT-Telnet address from=118.44.140.48
...
2020-01-18 05:15:35
178.128.21.38 attackbotsspam
Invalid user webmaster from 178.128.21.38 port 39294
2020-01-18 05:03:22
199.19.224.191 attack
Jan 17 22:03:48 pkdns2 sshd\[44980\]: Invalid user user from 199.19.224.191Jan 17 22:03:48 pkdns2 sshd\[44985\]: Invalid user test from 199.19.224.191Jan 17 22:03:48 pkdns2 sshd\[44982\]: Invalid user postgres from 199.19.224.191Jan 17 22:03:48 pkdns2 sshd\[44986\]: Invalid user hadoop from 199.19.224.191Jan 17 22:03:48 pkdns2 sshd\[44984\]: Invalid user devops from 199.19.224.191Jan 17 22:03:48 pkdns2 sshd\[44981\]: Invalid user oracle from 199.19.224.191Jan 17 22:03:48 pkdns2 sshd\[44983\]: Invalid user ubuntu from 199.19.224.191
...
2020-01-18 04:55:05
187.102.15.152 attack
Invalid user mo from 187.102.15.152 port 53119
2020-01-18 05:00:10
175.6.108.125 attackspambots
Invalid user rstudio from 175.6.108.125 port 52924
2020-01-18 05:05:30
181.57.153.190 attackbotsspam
Unauthorized connection attempt detected from IP address 181.57.153.190 to port 2220 [J]
2020-01-18 05:02:20
138.68.178.64 attackbotsspam
Jan 17 21:13:01 work-partkepr sshd\[1826\]: User postgres from 138.68.178.64 not allowed because not listed in AllowUsers
Jan 17 21:13:01 work-partkepr sshd\[1826\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.178.64  user=postgres
...
2020-01-18 05:18:31
194.108.0.86 attackbots
Unauthorized connection attempt detected from IP address 194.108.0.86 to port 2220 [J]
2020-01-18 04:57:23
202.73.9.76 attackbotsspam
Unauthorized connection attempt detected from IP address 202.73.9.76 to port 2220 [J]
2020-01-18 04:54:49
193.248.60.205 attack
3x Failed Password
2020-01-18 04:57:47
177.84.62.121 attackbotsspam
Invalid user admin from 177.84.62.121 port 34190
2020-01-18 05:03:47
209.141.55.231 attackbots
Lines containing failures of 209.141.55.231 (max 1000)
Jan 15 10:52:30 server sshd[26803]: Connection from 209.141.55.231 port 54236 on 62.116.165.82 port 22
Jan 15 10:52:31 server sshd[26803]: Invalid user liang from 209.141.55.231 port 54236
Jan 15 10:52:31 server sshd[26803]: Received disconnect from 209.141.55.231 port 54236:11: Bye Bye [preauth]
Jan 15 10:52:31 server sshd[26803]: Disconnected from 209.141.55.231 port 54236 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=209.141.55.231
2020-01-18 04:52:04
83.28.180.231 attackspambots
Invalid user ftpd from 83.28.180.231 port 42190
2020-01-18 04:43:11

Recently Reported IPs

148.101.83.236 148.101.234.101 148.105.251.17 148.105.251.19
148.102.45.52 148.105.251.16 148.137.10.13 148.129.75.166
148.141.109.57 148.141.109.50 230.143.136.84 148.153.135.206
148.153.162.134 148.153.0.170 148.141.109.36 148.153.50.205
148.153.138.236 148.153.55.244 148.149.27.27 148.141.109.95