Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.66.136.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22730
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.66.136.68.			IN	A

;; AUTHORITY SECTION:
.			376	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:43:21 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 68.136.66.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 68.136.66.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.27.228.157 attackspambots
 TCP (SYN) 193.27.228.157:55227 -> port 12048, len 44
2020-10-01 06:36:39
185.49.87.86 attackbots
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: tcp cat: Potentially Bad Trafficbytes: 60
2020-10-01 06:37:13
45.148.122.13 attackspam
1601504963 - 10/01/2020 00:29:23 Host: 45.148.122.13/45.148.122.13 Port: 389 UDP Blocked
...
2020-10-01 06:53:54
141.98.81.154 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-30T22:01:30Z
2020-10-01 06:38:45
94.102.51.17 attackspambots
firewall-block, port(s): 4731/tcp, 7472/tcp, 9917/tcp
2020-10-01 06:45:16
185.193.90.54 attackbots
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-01 07:03:33
68.183.55.223 attackspambots
scans once in preceeding hours on the ports (in chronological order) 24956 resulting in total of 4 scans from 68.183.0.0/16 block.
2020-10-01 06:51:27
193.27.228.156 attackbotsspam
[N1.H1.VM1] Port Scanner Detected Blocked by UFW
2020-10-01 07:02:11
101.251.219.100 attack
 TCP (SYN) 101.251.219.100:41493 -> port 19263, len 44
2020-10-01 07:08:57
103.145.13.58 attackspambots
probes 5 times on the port 5038 50802 8089 resulting in total of 24 scans from 103.145.13.0/24 block.
2020-10-01 06:42:02
45.143.221.85 attackspambots
" "
2020-10-01 06:54:36
193.27.228.154 attackbots
scans 16 times in preceeding hours on the ports (in chronological order) 4782 4721 3588 5177 4596 3784 4662 5156 5072 5493 4490 5079 4620 5262 5500 4785 resulting in total of 51 scans from 193.27.228.0/23 block.
2020-10-01 07:02:29
92.63.197.61 attackspambots
srv02 Mass scanning activity detected Target: 4643  ..
2020-10-01 07:12:17
71.6.232.6 attackbots
UDP port : 123
2020-10-01 06:51:13
95.156.113.49 attack
 TCP (SYN) 95.156.113.49:53787 -> port 445, len 44
2020-10-01 06:44:33

Recently Reported IPs

148.66.136.67 148.66.137.115 148.66.136.9 148.66.137.118
148.66.137.117 148.66.137.119 148.66.137.116 148.66.137.120
148.66.137.17 148.66.137.16 148.66.137.20 148.66.137.21
148.66.137.18 148.66.137.22 148.66.137.23 148.66.137.24
148.66.137.27 148.66.137.29 148.66.137.32 148.66.137.28