Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.168.148.220
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45909
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;199.168.148.220.		IN	A

;; AUTHORITY SECTION:
.			353	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112101 1800 900 604800 86400

;; Query time: 103 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Nov 22 19:58:51 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 220.148.168.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 220.148.168.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.128.108.100 attackspam
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-06-06 02:08:52
157.230.249.90 attackbots
Jun  5 16:51:09 vpn01 sshd[24233]: Failed password for root from 157.230.249.90 port 46122 ssh2
...
2020-06-06 02:11:16
112.65.127.154 attackspam
Jun  5 19:08:22 haigwepa sshd[31512]: Failed password for root from 112.65.127.154 port 14287 ssh2
...
2020-06-06 02:20:12
13.82.218.20 attackspam
Invalid user inma from 13.82.218.20 port 35700
2020-06-06 01:58:09
95.85.24.147 attack
Jun  5 18:26:48 ajax sshd[4692]: Failed password for root from 95.85.24.147 port 43938 ssh2
2020-06-06 01:43:38
14.169.224.192 attack
Invalid user admin from 14.169.224.192 port 55812
2020-06-06 01:55:50
180.76.156.178 attackbots
Invalid user rack from 180.76.156.178 port 59556
2020-06-06 02:07:42
141.98.81.83 attackbots
 TCP (SYN) 141.98.81.83:42191 -> port 22, len 60
2020-06-06 02:13:55
186.225.123.122 attack
Invalid user enter from 186.225.123.122 port 42108
2020-06-06 02:06:11
85.209.0.102 attack
 TCP (SYN) 85.209.0.102:49488 -> port 22, len 60
2020-06-06 01:45:07
179.56.251.41 attackbots
Invalid user cablecom from 179.56.251.41 port 41340
2020-06-06 02:08:35
141.98.81.107 attackbotsspam
Jun  5 15:51:31 vmd48417 sshd[17233]: Failed password for root from 141.98.81.107 port 41895 ssh2
2020-06-06 02:12:55
198.211.101.147 attack
Invalid user zzzzz from 198.211.101.147 port 47770
2020-06-06 02:02:01
122.51.71.156 attackspambots
Invalid user vladimir from 122.51.71.156 port 57548
2020-06-06 02:18:13
194.1.234.166 attackspam
Invalid user user from 194.1.234.166 port 37830
2020-06-06 02:03:25

Recently Reported IPs

59.80.121.168 235.224.111.239 146.132.9.161 79.165.206.251
62.89.23.159 187.49.88.166 177.185.105.81 117.50.11.192
88.99.231.246 187.148.4.82 89.135.122.109 125.167.244.15
90.92.243.46 210.4.119.93 117.157.104.44 47.52.246.241
54.36.113.62 209.141.42.150 113.143.116.73 100.99.116.122