Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Alcobendas

Region: Madrid

Country: Spain

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 193.148.121.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50044
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;193.148.121.240.		IN	A

;; AUTHORITY SECTION:
.			457	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020030402 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 05 04:37:49 CST 2020
;; MSG SIZE  rcvd: 119
Host info
240.121.148.193.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 100.100.2.138, trying next server
;; Got SERVFAIL reply from 100.100.2.138, trying next server
Server:		100.100.2.136
Address:	100.100.2.136#53

** server can't find 240.121.148.193.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
85.202.195.54 attackbots
Ein möglicherweise gefährlicher Request.Form-Wert wurde vom Client (mp$ContentZone$TxtMessage="  
2019-06-22 04:28:40
171.22.9.29 attackbots
5555/tcp
[2019-06-21]1pkt
2019-06-22 05:08:12
46.101.114.225 attack
Bad Request: "\x15\x03\x01\x00\x02\x02P" Bad Request: "\x15\x03\x01\x00\x02\x02P"
2019-06-22 04:28:59
222.160.218.129 attackbots
5500/tcp
[2019-06-21]1pkt
2019-06-22 04:56:05
103.91.54.100 attack
SSH bruteforce
2019-06-22 04:37:46
138.59.218.127 attackspam
2019-06-18T02:19:07.212925kvm.hostname-sakh.net sshd[32411]: Invalid user schweers from 138.59.218.127 port 56886
2019-06-18T02:19:07.218812kvm.hostname-sakh.net sshd[32411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.59.218.127
2019-06-18T02:19:09.309582kvm.hostname-sakh.net sshd[32411]: Failed password for invalid user schweers from 138.59.218.127 port 56886 ssh2
2019-06-18T02:24:14.395111kvm.hostname-sakh.net sshd[32580]: Invalid user sibert from 138.59.218.127 port 44486
2019-06-18T02:24:14.400791kvm.hostname-sakh.net sshd[32580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.59.218.127

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=138.59.218.127
2019-06-22 05:02:00
61.148.29.198 attack
$f2bV_matches
2019-06-22 04:49:49
193.112.27.92 attackbots
Jun 21 23:09:08 yabzik sshd[19175]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.27.92
Jun 21 23:09:10 yabzik sshd[19175]: Failed password for invalid user kun from 193.112.27.92 port 52516 ssh2
Jun 21 23:10:36 yabzik sshd[19779]: Failed password for root from 193.112.27.92 port 37838 ssh2
2019-06-22 04:40:01
177.33.139.26 attackspam
¯\_(ツ)_/¯
2019-06-22 04:36:09
14.85.88.4 attackspam
Autoban   14.85.88.4 ABORTED AUTH
2019-06-22 05:07:46
89.238.154.18 attackbots
Attacks websites by trying to access known vulnerables of plugins, brute-force of backends or probing of administrative tools
2019-06-22 04:48:52
162.247.74.74 attack
Request: "GET /mos.php HTTP/1.1"
2019-06-22 04:25:45
62.197.120.198 attack
$f2bV_matches
2019-06-22 05:00:47
91.185.1.70 attackspam
Request: "GET / HTTP/1.1"
2019-06-22 05:00:16
31.44.78.103 attackbotsspam
Request: "GET / HTTP/1.1"
2019-06-22 04:55:46

Recently Reported IPs

113.224.151.181 5.236.145.26 58.142.94.56 89.114.243.112
108.2.60.38 70.102.73.127 33.88.45.123 212.92.108.4
193.88.239.23 1.100.124.207 252.87.123.70 28.227.249.73
8.152.61.171 195.204.237.181 151.57.8.24 55.176.28.72
93.182.240.1 146.180.239.93 168.212.72.65 52.33.64.157