Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.66.131.121
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1716
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.66.131.121.			IN	A

;; AUTHORITY SECTION:
.			427	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 51 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:42:54 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 121.131.66.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 121.131.66.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.173.35.1 attack
Port scan: Attack repeated for 24 hours
2020-05-15 06:24:21
181.226.179.57 attackspambots
May 14 22:55:09 melroy-server sshd[5955]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.226.179.57 
May 14 22:55:11 melroy-server sshd[5955]: Failed password for invalid user admin2 from 181.226.179.57 port 60007 ssh2
...
2020-05-15 06:25:25
54.36.77.233 attack
[Thu May 14 18:36:43.285432 2020] [:error] [pid 185897] [client 54.36.77.233:59194] [client 54.36.77.233] ModSecurity: Access denied with code 403 (phase 2). Operator GE matched 5 at TX:anomaly_score. [file "/usr/share/modsecurity-crs/rules/REQUEST-949-BLOCKING-EVALUATION.conf"] [line "91"] [id "949110"] [msg "Inbound Anomaly Score Exceeded (Total Score: 18)"] [severity "CRITICAL"] [tag "application-multi"] [tag "language-multi"] [tag "platform-multi"] [tag "attack-generic"] [hostname "127.0.0.1"] [uri "/cgi-bin/ViewLog.asp"] [unique_id "Xr256kYM-MpM8O47hf7vigAAAAM"]
...
2020-05-15 06:12:54
194.61.55.164 attackbotsspam
May 15 01:23:03 pkdns2 sshd\[55954\]: Invalid user admin from 194.61.55.164May 15 01:23:05 pkdns2 sshd\[55954\]: Failed password for invalid user admin from 194.61.55.164 port 55298 ssh2May 15 01:23:06 pkdns2 sshd\[55956\]: Invalid user admin from 194.61.55.164May 15 01:23:07 pkdns2 sshd\[55956\]: Failed password for invalid user admin from 194.61.55.164 port 56630 ssh2May 15 01:23:08 pkdns2 sshd\[55958\]: Invalid user admin from 194.61.55.164May 15 01:23:09 pkdns2 sshd\[55958\]: Failed password for invalid user admin from 194.61.55.164 port 57582 ssh2
...
2020-05-15 06:26:57
112.85.42.173 attack
2020-05-15T00:04:31.786199centos sshd[23381]: Failed password for root from 112.85.42.173 port 23870 ssh2
2020-05-15T00:04:34.896042centos sshd[23381]: Failed password for root from 112.85.42.173 port 23870 ssh2
2020-05-15T00:04:37.873047centos sshd[23381]: Failed password for root from 112.85.42.173 port 23870 ssh2
...
2020-05-15 06:13:53
161.35.104.193 attackbotsspam
Fail2Ban Ban Triggered
2020-05-15 06:41:49
106.54.182.239 attack
sshd jail - ssh hack attempt
2020-05-15 06:22:42
130.61.236.64 attackspam
C1,DEF GET /phpMyAdmin/scripts/setup.php
2020-05-15 06:20:48
3.11.149.42 attack
xmlrpc attack
2020-05-15 06:04:11
60.215.47.106 attack
60.215.47.106 - - [27/Mar/2020:10:48:30 +0100] "GET /plus/carbuyaction.php HTTP/1.1" 404 13077
...
2020-05-15 06:10:59
167.71.69.108 attack
Invalid user admin from 167.71.69.108 port 44346
2020-05-15 06:09:13
49.232.144.7 attack
[ssh] SSH attack
2020-05-15 06:35:59
183.88.243.90 attack
Brute Force - Dovecot
2020-05-15 06:11:35
188.166.34.129 attackbotsspam
Invalid user user from 188.166.34.129 port 53646
2020-05-15 06:13:22
102.186.17.202 attackspambots
RDP Brute-Force (honeypot 13)
2020-05-15 06:15:17

Recently Reported IPs

148.66.130.81 148.66.129.111 148.66.129.197 148.66.131.88
148.66.132.147 148.66.131.196 148.66.132.238 148.66.130.138
148.66.132.237 148.66.132.245 148.66.132.46 148.66.133.181
148.66.133.65 148.66.133.236 148.66.133.83 148.66.134.187
148.66.135.0 148.66.134.129 148.66.133.89 148.66.135.121