Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.109.136.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.109.136.239.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 12:18:15 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 239.136.109.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.136.109.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
118.24.8.99 attackbotsspam
Jun 21 04:52:35 ajax sshd[26592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.8.99 
Jun 21 04:52:37 ajax sshd[26592]: Failed password for invalid user zh from 118.24.8.99 port 35644 ssh2
2020-06-21 17:21:21
107.170.48.64 attackspambots
$f2bV_matches
2020-06-21 17:25:43
185.85.190.132 attackspambots
CMS (WordPress or Joomla) login attempt.
2020-06-21 17:22:24
49.233.135.204 attackbots
leo_www
2020-06-21 17:17:38
186.84.172.25 attackbotsspam
Jun 21 11:28:52 sso sshd[13252]: Failed password for root from 186.84.172.25 port 48418 ssh2
...
2020-06-21 17:39:39
1.30.219.93 attackspam
06/20/2020-23:52:51.419326 1.30.219.93 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2020-06-21 17:11:00
198.199.124.109 attackspambots
Invalid user wangqiang from 198.199.124.109 port 36906
2020-06-21 17:12:19
46.105.29.160 attack
2020-06-21T10:19:56.466120vps751288.ovh.net sshd\[3075\]: Invalid user admin from 46.105.29.160 port 58924
2020-06-21T10:19:56.476958vps751288.ovh.net sshd\[3075\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.ip-46-105-29.eu
2020-06-21T10:19:58.400962vps751288.ovh.net sshd\[3075\]: Failed password for invalid user admin from 46.105.29.160 port 58924 ssh2
2020-06-21T10:21:39.869728vps751288.ovh.net sshd\[3144\]: Invalid user why from 46.105.29.160 port 57884
2020-06-21T10:21:39.877917vps751288.ovh.net sshd\[3144\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=160.ip-46-105-29.eu
2020-06-21 17:30:59
27.71.227.198 attackbotsspam
Jun 21 03:48:06 onepixel sshd[3917901]: Invalid user git from 27.71.227.198 port 53564
Jun 21 03:48:06 onepixel sshd[3917901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.71.227.198 
Jun 21 03:48:06 onepixel sshd[3917901]: Invalid user git from 27.71.227.198 port 53564
Jun 21 03:48:08 onepixel sshd[3917901]: Failed password for invalid user git from 27.71.227.198 port 53564 ssh2
Jun 21 03:52:05 onepixel sshd[3919606]: Invalid user mcq from 27.71.227.198 port 53200
2020-06-21 17:40:59
85.66.249.123 attackbots
2020-06-21T08:55:18.114013dmca.cloudsearch.cf sshd[12734]: Invalid user pi from 85.66.249.123 port 36290
2020-06-21T08:55:18.141451dmca.cloudsearch.cf sshd[12735]: Invalid user pi from 85.66.249.123 port 36294
2020-06-21T08:55:18.180810dmca.cloudsearch.cf sshd[12734]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=fibhost-66-249-123.fibernet.hu
2020-06-21T08:55:18.114013dmca.cloudsearch.cf sshd[12734]: Invalid user pi from 85.66.249.123 port 36290
2020-06-21T08:55:20.082193dmca.cloudsearch.cf sshd[12734]: Failed password for invalid user pi from 85.66.249.123 port 36290 ssh2
2020-06-21T08:55:18.210007dmca.cloudsearch.cf sshd[12735]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=fibhost-66-249-123.fibernet.hu
2020-06-21T08:55:18.141451dmca.cloudsearch.cf sshd[12735]: Invalid user pi from 85.66.249.123 port 36294
2020-06-21T08:55:20.111395dmca.cloudsearch.cf sshd[12735]: Failed password for invalid user pi
...
2020-06-21 17:22:55
112.85.42.180 attack
2020-06-21T10:00:00.648962vps751288.ovh.net sshd\[2742\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
2020-06-21T10:00:02.377951vps751288.ovh.net sshd\[2742\]: Failed password for root from 112.85.42.180 port 17943 ssh2
2020-06-21T10:00:05.888827vps751288.ovh.net sshd\[2742\]: Failed password for root from 112.85.42.180 port 17943 ssh2
2020-06-21T10:00:09.310911vps751288.ovh.net sshd\[2742\]: Failed password for root from 112.85.42.180 port 17943 ssh2
2020-06-21T10:00:12.514371vps751288.ovh.net sshd\[2742\]: Failed password for root from 112.85.42.180 port 17943 ssh2
2020-06-21 17:08:55
61.177.172.143 attack
(sshd) Failed SSH login from 61.177.172.143 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 21 11:05:31 amsweb01 sshd[25590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.143  user=root
Jun 21 11:05:32 amsweb01 sshd[25592]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.177.172.143  user=root
Jun 21 11:05:33 amsweb01 sshd[25590]: Failed password for root from 61.177.172.143 port 52317 ssh2
Jun 21 11:05:34 amsweb01 sshd[25592]: Failed password for root from 61.177.172.143 port 46855 ssh2
Jun 21 11:05:37 amsweb01 sshd[25590]: Failed password for root from 61.177.172.143 port 52317 ssh2
2020-06-21 17:29:16
111.229.3.209 attack
(sshd) Failed SSH login from 111.229.3.209 (CN/China/-): 5 in the last 3600 secs
2020-06-21 17:46:47
101.99.14.49 attackbots
Jun 21 10:51:43 vpn01 sshd[8867]: Failed password for root from 101.99.14.49 port 34928 ssh2
...
2020-06-21 17:32:05
212.83.140.191 attackbots
[2020-06-21 05:35:38] NOTICE[1273] chan_sip.c: Registration from '"250"' failed for '212.83.140.191:18837' - Wrong password
[2020-06-21 05:35:38] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-21T05:35:38.737-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="250",SessionID="0x7f31c0334138",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.140.191/18837",Challenge="59437e0c",ReceivedChallenge="59437e0c",ReceivedHash="b404b49e3607bb786e1187b622cf55d8"
[2020-06-21 05:38:33] NOTICE[1273] chan_sip.c: Registration from '"251"' failed for '212.83.140.191:2112' - Wrong password
[2020-06-21 05:38:33] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-21T05:38:33.994-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="251",SessionID="0x7f31c00517b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.8
...
2020-06-21 17:42:42

Recently Reported IPs

141.27.52.5 157.120.131.29 150.152.168.189 214.93.9.141
35.39.227.215 239.18.199.51 34.202.197.221 53.117.181.25
131.158.150.164 29.160.5.82 214.142.142.48 66.99.177.16
57.242.195.153 215.182.145.187 97.166.55.100 245.210.148.213
135.152.151.166 87.107.174.178 192.74.63.148 163.192.70.76