Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.109.136.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.109.136.239.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 12:18:15 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 239.136.109.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.136.109.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
150.136.193.165 attack
Reported by AbuseIPDB proxy server.
2019-08-12 08:01:38
103.42.58.102 attackbotsspam
103.42.58.102 - - [11/Aug/2019:23:19:28 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.42.58.102 - - [11/Aug/2019:23:19:29 +0200] "POST /wp-login.php HTTP/1.1" 200 1503 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.42.58.102 - - [11/Aug/2019:23:19:30 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.42.58.102 - - [11/Aug/2019:23:19:30 +0200] "POST /wp-login.php HTTP/1.1" 200 1489 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.42.58.102 - - [11/Aug/2019:23:19:31 +0200] "GET /wp-login.php HTTP/1.1" 200 1122 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
103.42.58.102 - - [11/Aug/2019:23:19:32 +0200] "POST /wp-login.php HTTP/1.1" 200 1491 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-08-12 08:19:11
85.202.194.105 attackspam
601.276,14-04/03 [bc17/m40] concatform PostRequest-Spammer scoring: maputo01_x2b
2019-08-12 08:14:02
183.196.117.245 attackspambots
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-12 07:44:16
206.189.239.103 attackbotsspam
2019-08-11T21:53:17.027514abusebot-5.cloudsearch.cf sshd\[26287\]: Invalid user qhsupport from 206.189.239.103 port 40134
2019-08-12 07:46:02
191.33.247.103 attackspam
Aug 11 23:28:01 [snip] sshd[15176]: Invalid user cscott from 191.33.247.103 port 38564
Aug 11 23:28:01 [snip] sshd[15176]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.33.247.103
Aug 11 23:28:03 [snip] sshd[15176]: Failed password for invalid user cscott from 191.33.247.103 port 38564 ssh2[...]
2019-08-12 08:12:49
200.38.233.65 attackbotsspam
Automatic report - Port Scan Attack
2019-08-12 08:06:41
181.198.86.24 attack
2019-08-11T23:52:10.903723abusebot-8.cloudsearch.cf sshd\[26393\]: Invalid user albert from 181.198.86.24 port 50585
2019-08-12 08:18:10
115.84.112.98 attackbotsspam
Feb  5 00:27:52 vtv3 sshd\[29354\]: Invalid user ericsson from 115.84.112.98 port 32854
Feb  5 00:27:52 vtv3 sshd\[29354\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.84.112.98
Feb  5 00:27:54 vtv3 sshd\[29354\]: Failed password for invalid user ericsson from 115.84.112.98 port 32854 ssh2
Feb  5 00:33:24 vtv3 sshd\[30839\]: Invalid user baidu from 115.84.112.98 port 36918
Feb  5 00:33:24 vtv3 sshd\[30839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.84.112.98
Feb 17 07:02:35 vtv3 sshd\[18251\]: Invalid user postpone from 115.84.112.98 port 37842
Feb 17 07:02:35 vtv3 sshd\[18251\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.84.112.98
Feb 17 07:02:37 vtv3 sshd\[18251\]: Failed password for invalid user postpone from 115.84.112.98 port 37842 ssh2
Feb 17 07:07:13 vtv3 sshd\[19542\]: Invalid user cq from 115.84.112.98 port 34160
Feb 17 07:07:13 vtv3 sshd\[19542
2019-08-12 07:42:05
178.128.171.243 attackspambots
Automated report - ssh fail2ban:
Aug 11 23:36:25 wrong password, user=giacomini, port=39532, ssh2
Aug 12 00:08:01 authentication failure 
Aug 12 00:08:03 wrong password, user=anni, port=58486, ssh2
2019-08-12 08:02:08
93.113.134.133 attack
(Aug 12)  LEN=40 TTL=246 ID=41127 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 12)  LEN=40 TTL=246 ID=16525 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 11)  LEN=40 TTL=246 ID=38490 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 11)  LEN=40 TTL=246 ID=38838 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 11)  LEN=40 TTL=246 ID=5341 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 11)  LEN=40 TTL=246 ID=50302 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 11)  LEN=40 TTL=246 ID=6016 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 11)  LEN=40 TTL=246 ID=26133 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 11)  LEN=40 TTL=246 ID=20065 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 11)  LEN=40 TTL=246 ID=20300 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 11)  LEN=40 TTL=246 ID=20981 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 11)  LEN=40 TTL=246 ID=21960 DF TCP DPT=23 WINDOW=14600 SYN 
 (Aug 11)  LEN=40 TTL=246 ID=55856 DF TCP DPT=23 WINDOW=14600 SYN
2019-08-12 08:13:33
66.130.210.106 attackspambots
Invalid user www from 66.130.210.106 port 43891
2019-08-12 08:04:53
36.85.34.63 attack
Automatic report - Port Scan Attack
2019-08-12 07:54:00
124.156.50.191 attack
2222/tcp 7144/tcp 4155/tcp...
[2019-07-17/08-11]7pkt,6pt.(tcp),1pt.(udp)
2019-08-12 08:04:21
149.56.129.68 attackspam
Aug 11 20:41:34 tuxlinux sshd[14069]: Invalid user top from 149.56.129.68 port 43518
Aug 11 20:41:34 tuxlinux sshd[14069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.129.68 
Aug 11 20:41:34 tuxlinux sshd[14069]: Invalid user top from 149.56.129.68 port 43518
Aug 11 20:41:34 tuxlinux sshd[14069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.129.68 
Aug 11 20:41:34 tuxlinux sshd[14069]: Invalid user top from 149.56.129.68 port 43518
Aug 11 20:41:34 tuxlinux sshd[14069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.129.68 
Aug 11 20:41:36 tuxlinux sshd[14069]: Failed password for invalid user top from 149.56.129.68 port 43518 ssh2
...
2019-08-12 07:56:43

Recently Reported IPs

141.27.52.5 157.120.131.29 150.152.168.189 214.93.9.141
35.39.227.215 239.18.199.51 34.202.197.221 53.117.181.25
131.158.150.164 29.160.5.82 214.142.142.48 66.99.177.16
57.242.195.153 215.182.145.187 97.166.55.100 245.210.148.213
135.152.151.166 87.107.174.178 192.74.63.148 163.192.70.76