Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 161.148.21.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64140
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;161.148.21.12.			IN	A

;; AUTHORITY SECTION:
.			480	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020053100 1800 900 604800 86400

;; Query time: 108 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 31 19:11:32 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 12.21.148.161.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.21.148.161.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
194.182.86.133 attack
Dec  2 18:01:10 [host] sshd[13854]: Invalid user delair from 194.182.86.133
Dec  2 18:01:10 [host] sshd[13854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.182.86.133
Dec  2 18:01:11 [host] sshd[13854]: Failed password for invalid user delair from 194.182.86.133 port 33120 ssh2
2019-12-03 04:51:30
50.207.12.103 attack
Dec  2 10:41:46 hanapaa sshd\[13128\]: Invalid user celery from 50.207.12.103
Dec  2 10:41:46 hanapaa sshd\[13128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50-207-12-103-static.hfc.comcastbusiness.net
Dec  2 10:41:48 hanapaa sshd\[13128\]: Failed password for invalid user celery from 50.207.12.103 port 49624 ssh2
Dec  2 10:47:11 hanapaa sshd\[13622\]: Invalid user henley from 50.207.12.103
Dec  2 10:47:11 hanapaa sshd\[13622\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=50-207-12-103-static.hfc.comcastbusiness.net
2019-12-03 05:00:47
203.195.159.186 attack
Dec  2 12:35:53 *** sshd[19725]: Failed password for invalid user samsudin from 203.195.159.186 port 59016 ssh2
Dec  2 12:58:27 *** sshd[20146]: Failed password for invalid user guest from 203.195.159.186 port 43312 ssh2
Dec  2 13:06:07 *** sshd[20328]: Failed password for invalid user bruce from 203.195.159.186 port 47737 ssh2
Dec  2 13:13:42 *** sshd[20483]: Failed password for invalid user argyriou from 203.195.159.186 port 52166 ssh2
Dec  2 13:21:12 *** sshd[20607]: Failed password for invalid user charleston from 203.195.159.186 port 56572 ssh2
Dec  2 13:28:22 *** sshd[20820]: Failed password for invalid user bertiere from 203.195.159.186 port 60956 ssh2
Dec  2 13:35:36 *** sshd[20936]: Failed password for invalid user test from 203.195.159.186 port 37123 ssh2
Dec  2 13:43:11 *** sshd[21173]: Failed password for invalid user cardozo from 203.195.159.186 port 41520 ssh2
Dec  2 13:50:43 *** sshd[21314]: Failed password for invalid user nfs from 203.195.159.186 port 45922 ssh2
Dec  2 14:05:45 *** sshd[21658
2019-12-03 05:01:00
118.70.42.50 attackbotsspam
Unauthorized connection attempt from IP address 118.70.42.50 on Port 445(SMB)
2019-12-03 05:04:50
188.166.45.128 attackbotsspam
WEB Masscan Scanner Activity
2019-12-03 04:55:19
179.157.250.36 attackspambots
Unauthorised access (Dec  2) SRC=179.157.250.36 LEN=52 TOS=0x10 PREC=0x40 TTL=114 ID=29981 DF TCP DPT=445 WINDOW=8192 SYN
2019-12-03 05:15:44
103.235.170.149 attackbots
fraudulent SSH attempt
2019-12-03 05:09:10
43.255.84.14 attackspambots
Dec  2 21:45:18 Ubuntu-1404-trusty-64-minimal sshd\[29627\]: Invalid user mysql from 43.255.84.14
Dec  2 21:45:18 Ubuntu-1404-trusty-64-minimal sshd\[29627\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.255.84.14
Dec  2 21:45:20 Ubuntu-1404-trusty-64-minimal sshd\[29627\]: Failed password for invalid user mysql from 43.255.84.14 port 34357 ssh2
Dec  2 21:53:05 Ubuntu-1404-trusty-64-minimal sshd\[5585\]: Invalid user admin from 43.255.84.14
Dec  2 21:53:05 Ubuntu-1404-trusty-64-minimal sshd\[5585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.255.84.14
2019-12-03 05:14:08
98.156.148.239 attack
Dec  3 01:21:22 itv-usvr-01 sshd[11080]: Invalid user com from 98.156.148.239
Dec  3 01:21:22 itv-usvr-01 sshd[11080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.156.148.239
Dec  3 01:21:22 itv-usvr-01 sshd[11080]: Invalid user com from 98.156.148.239
Dec  3 01:21:24 itv-usvr-01 sshd[11080]: Failed password for invalid user com from 98.156.148.239 port 55394 ssh2
Dec  3 01:27:55 itv-usvr-01 sshd[11333]: Invalid user randy from 98.156.148.239
2019-12-03 05:22:21
168.70.121.87 attackspam
Exploit Attempt
2019-12-03 04:57:46
5.24.152.234 attackspambots
Unauthorized connection attempt from IP address 5.24.152.234 on Port 445(SMB)
2019-12-03 04:50:39
106.13.43.117 attack
Dec  2 21:09:42 vps666546 sshd\[1289\]: Invalid user caple from 106.13.43.117 port 47862
Dec  2 21:09:42 vps666546 sshd\[1289\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.43.117
Dec  2 21:09:44 vps666546 sshd\[1289\]: Failed password for invalid user caple from 106.13.43.117 port 47862 ssh2
Dec  2 21:15:25 vps666546 sshd\[1577\]: Invalid user sidor from 106.13.43.117 port 52708
Dec  2 21:15:25 vps666546 sshd\[1577\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.43.117
...
2019-12-03 05:17:27
185.232.67.8 attackbotsspam
Dec  2 21:33:50 dedicated sshd[30945]: Invalid user admin from 185.232.67.8 port 34742
2019-12-03 05:13:16
105.112.112.61 attackspam
Triggered: repeated knocking on closed ports.
2019-12-03 05:16:06
191.191.221.184 attackbotsspam
Automatic report - Port Scan Attack
2019-12-03 05:03:46

Recently Reported IPs

152.136.224.46 79.239.202.182 185.100.87.243 64.225.5.107
45.46.222.55 118.166.97.164 34.92.83.116 95.70.188.23
58.215.235.146 177.181.229.248 183.77.184.61 218.104.128.54
196.130.190.153 196.16.244.212 180.76.140.251 80.186.2.84
114.35.74.118 85.95.178.83 101.109.85.196 185.125.253.58