Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Poland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 178.239.21.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59640
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;178.239.21.148.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 09:02:50 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 148.21.239.178.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.21.239.178.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.95.240.245 attackspam
Invalid user sys from 93.95.240.245 port 37936
2020-06-17 15:31:59
104.215.72.98 attack
Invalid user ubuntu from 104.215.72.98 port 50668
2020-06-17 16:02:35
115.127.11.146 attackspam
Jun 17 09:31:19 vpn01 sshd[20803]: Failed password for root from 115.127.11.146 port 50916 ssh2
...
2020-06-17 16:12:59
188.81.40.115 attack
Invalid user pi from 188.81.40.115 port 57430
2020-06-17 16:00:41
84.17.48.65 attack
it is trying to access my computer several time... seems like a brute force attack
2020-06-17 16:10:18
216.144.254.130 attackbots
Port scanning [10 denied]
2020-06-17 15:38:11
142.93.101.148 attackspam
Invalid user tomm from 142.93.101.148 port 37772
2020-06-17 15:35:38
185.39.10.58 attack
Port scan on 3 port(s): 2986 3010 3041
2020-06-17 16:07:38
183.62.49.212 attackspam
Jun 17 09:27:39 eventyay sshd[32550]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.49.212
Jun 17 09:27:42 eventyay sshd[32550]: Failed password for invalid user nas from 183.62.49.212 port 38106 ssh2
Jun 17 09:31:15 eventyay sshd[32638]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.62.49.212
...
2020-06-17 15:54:15
198.20.103.242 attackbotsspam
Unauthorized connection attempt detected from IP address 198.20.103.242 to port 9943
2020-06-17 15:35:16
104.131.97.47 attackspam
k+ssh-bruteforce
2020-06-17 15:40:00
51.89.136.104 attackbots
Jun 17 02:58:13 mx sshd[31208]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.89.136.104
Jun 17 02:58:15 mx sshd[31208]: Failed password for invalid user aaliyah from 51.89.136.104 port 34026 ssh2
2020-06-17 15:37:26
185.16.238.198 attackspambots
23 attempts against mh-misbehave-ban on sonic
2020-06-17 15:55:37
91.121.65.15 attackbots
Invalid user steve from 91.121.65.15 port 39164
2020-06-17 16:11:22
167.71.216.20 attackspambots
$f2bV_matches
2020-06-17 16:12:40

Recently Reported IPs

31.57.69.142 80.191.101.117 40.107.15.113 46.102.200.149
2.183.95.198 187.162.175.235 152.136.253.195 89.22.198.99
82.151.125.15 195.64.162.175 149.134.209.35 23.108.75.127
27.41.36.230 103.92.25.24 42.236.17.244 122.168.109.89
42.192.193.147 165.227.73.210 20.119.199.213 197.232.26.226