Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santiago

Region: Santiago Metropolitan

Country: Chile

Internet Service Provider: unknown

Hostname: unknown

Organization: TELEFÓNICA CHILE S.A.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.21.30.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2937
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;190.21.30.148.			IN	A

;; AUTHORITY SECTION:
.			4	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019052900 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 30 00:24:57 CST 2019
;; MSG SIZE  rcvd: 117

Host info
148.30.21.190.in-addr.arpa domain name pointer 190-21-30-148.baf.movistar.cl.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
148.30.21.190.in-addr.arpa	name = 190-21-30-148.baf.movistar.cl.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
145.239.42.107 attackspam
SSH brutforce
2019-11-07 18:12:35
76.24.160.205 attackbotsspam
Nov  7 09:27:59 bouncer sshd\[27953\]: Invalid user !@34QWerty from 76.24.160.205 port 46784
Nov  7 09:27:59 bouncer sshd\[27953\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=76.24.160.205 
Nov  7 09:28:00 bouncer sshd\[27953\]: Failed password for invalid user !@34QWerty from 76.24.160.205 port 46784 ssh2
...
2019-11-07 18:28:50
45.55.231.94 attackbotsspam
Automatic report - Banned IP Access
2019-11-07 18:41:02
213.32.122.82 attack
400 BAD REQUEST
2019-11-07 18:23:22
92.58.62.49 attackspambots
port scan and connect, tcp 80 (http)
2019-11-07 18:41:14
120.131.11.224 attackspambots
Nov  6 02:51:48 olgosrv01 sshd[23884]: Invalid user adminixxxr from 120.131.11.224
Nov  6 02:51:48 olgosrv01 sshd[23884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.11.224 
Nov  6 02:51:51 olgosrv01 sshd[23884]: Failed password for invalid user adminixxxr from 120.131.11.224 port 60888 ssh2
Nov  6 02:51:51 olgosrv01 sshd[23884]: Received disconnect from 120.131.11.224: 11: Bye Bye [preauth]
Nov  6 02:57:38 olgosrv01 sshd[24275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.131.11.224  user=r.r
Nov  6 02:57:39 olgosrv01 sshd[24275]: Failed password for r.r from 120.131.11.224 port 39356 ssh2
Nov  6 02:57:40 olgosrv01 sshd[24275]: Received disconnect from 120.131.11.224: 11: Bye Bye [preauth]
Nov  6 03:02:18 olgosrv01 sshd[24583]: Invalid user 9 from 120.131.11.224
Nov  6 03:02:18 olgosrv01 sshd[24583]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=........
-------------------------------
2019-11-07 18:42:28
46.38.144.146 attackbotsspam
2019-11-07T11:18:08.051594mail01 postfix/smtpd[32019]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07T11:18:14.166837mail01 postfix/smtpd[5994]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07T11:18:19.394388mail01 postfix/smtpd[14106]: warning: unknown[46.38.144.146]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-11-07 18:21:12
51.158.189.247 attack
Telnet Server BruteForce Attack
2019-11-07 18:22:32
222.186.31.204 attack
Nov  7 07:21:55 vmi181237 sshd\[7343\]: refused connect from 222.186.31.204 \(222.186.31.204\)
Nov  7 07:22:45 vmi181237 sshd\[7363\]: refused connect from 222.186.31.204 \(222.186.31.204\)
Nov  7 07:23:22 vmi181237 sshd\[7382\]: refused connect from 222.186.31.204 \(222.186.31.204\)
Nov  7 07:24:00 vmi181237 sshd\[7403\]: refused connect from 222.186.31.204 \(222.186.31.204\)
Nov  7 07:24:39 vmi181237 sshd\[7421\]: refused connect from 222.186.31.204 \(222.186.31.204\)
2019-11-07 18:44:36
178.128.162.10 attack
Nov  7 10:36:29 * sshd[953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.162.10
Nov  7 10:36:31 * sshd[953]: Failed password for invalid user Qwer!@#456 from 178.128.162.10 port 40180 ssh2
2019-11-07 18:36:08
46.151.9.52 attack
port scan and connect, tcp 23 (telnet)
2019-11-07 18:33:28
168.232.197.5 attack
2019-11-07T06:57:15.221064abusebot-4.cloudsearch.cf sshd\[4365\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168-232-197-5.static.konectivatelecomunicacoes.com.br  user=root
2019-11-07 18:11:04
184.66.225.102 attackspam
Nov 07 02:04:58 askasleikir sshd[28296]: Failed password for invalid user www from 184.66.225.102 port 37424 ssh2
2019-11-07 18:18:36
202.137.155.249 attackbots
IMAP/SMTP Authentication Failure
2019-11-07 18:45:13
45.125.66.55 attackspam
\[2019-11-07 05:12:06\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T05:12:06.192-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="7725701148122518048",SessionID="0x7fdf2c6a6f18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.55/50726",ACLName="no_extension_match"
\[2019-11-07 05:12:20\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T05:12:20.115-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="7392701148134454002",SessionID="0x7fdf2c7cd048",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.55/61028",ACLName="no_extension_match"
\[2019-11-07 05:12:36\] SECURITY\[2634\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-07T05:12:36.616-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="7059001148767414007",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.125.66.55/63102",ACLNam
2019-11-07 18:17:42

Recently Reported IPs

191.14.195.114 204.153.121.15 100.25.31.116 196.218.121.208
61.71.135.12 202.163.110.162 82.252.180.136 81.229.163.80
190.210.222.94 78.133.146.218 69.70.224.174 47.75.181.59
112.197.243.102 53.5.41.102 186.153.104.116 92.36.114.11
14.61.205.16 2.31.20.112 221.217.51.229 195.9.189.171