Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.107.148.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54769
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.107.148.219.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021901 1800 900 604800 86400

;; Query time: 44 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 03:35:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
219.148.107.2.in-addr.arpa domain name pointer 2-107-148-219-static.dk.customer.tdc.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
219.148.107.2.in-addr.arpa	name = 2-107-148-219-static.dk.customer.tdc.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.44.67.174 attackbotsspam
Unauthorized connection attempt from IP address 157.44.67.174 on Port 445(SMB)
2020-04-19 00:33:11
51.15.194.51 attackspambots
Apr 18 11:13:13 XXXXXX sshd[44805]: Invalid user oracle from 51.15.194.51 port 48328
2020-04-19 00:36:05
170.238.51.217 attackspambots
firewall-block, port(s): 23/tcp
2020-04-18 23:58:45
5.147.173.226 attack
Apr 18 13:53:51 xeon sshd[14834]: Failed password for invalid user tb from 5.147.173.226 port 37020 ssh2
2020-04-19 00:36:20
106.13.233.186 attackspam
Apr 18 14:48:13  sshd[8614]: Failed password for invalid user kp from 106.13.233.186 port 49782 ssh2
2020-04-19 00:30:30
94.139.185.210 attackspam
Unauthorized connection attempt from IP address 94.139.185.210 on Port 445(SMB)
2020-04-19 00:14:01
182.43.134.224 attackbotsspam
$f2bV_matches
2020-04-19 00:25:13
51.75.207.61 attack
2020-04-18T14:27:53.256916abusebot-3.cloudsearch.cf sshd[18097]: Invalid user postgres from 51.75.207.61 port 56998
2020-04-18T14:27:53.264238abusebot-3.cloudsearch.cf sshd[18097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.ip-51-75-207.eu
2020-04-18T14:27:53.256916abusebot-3.cloudsearch.cf sshd[18097]: Invalid user postgres from 51.75.207.61 port 56998
2020-04-18T14:27:55.535758abusebot-3.cloudsearch.cf sshd[18097]: Failed password for invalid user postgres from 51.75.207.61 port 56998 ssh2
2020-04-18T14:32:16.064212abusebot-3.cloudsearch.cf sshd[18448]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.ip-51-75-207.eu  user=root
2020-04-18T14:32:18.105006abusebot-3.cloudsearch.cf sshd[18448]: Failed password for root from 51.75.207.61 port 46792 ssh2
2020-04-18T14:36:36.131153abusebot-3.cloudsearch.cf sshd[18736]: Invalid user hs from 51.75.207.61 port 36586
...
2020-04-19 00:28:42
104.236.239.60 attack
SSH Brute-Force attacks
2020-04-19 00:13:41
89.188.160.51 attack
1587211204 - 04/18/2020 14:00:04 Host: 89.188.160.51/89.188.160.51 Port: 445 TCP Blocked
2020-04-19 00:14:27
51.75.140.153 attackbots
2020-04-18T11:20:32.7997291495-001 sshd[40057]: Invalid user gitlab-runner from 51.75.140.153 port 36720
2020-04-18T11:20:34.0819901495-001 sshd[40057]: Failed password for invalid user gitlab-runner from 51.75.140.153 port 36720 ssh2
2020-04-18T11:24:52.9763331495-001 sshd[40270]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.ip-51-75-140.eu  user=root
2020-04-18T11:24:54.7270941495-001 sshd[40270]: Failed password for root from 51.75.140.153 port 54642 ssh2
2020-04-18T11:29:08.7130811495-001 sshd[40543]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=153.ip-51-75-140.eu  user=root
2020-04-18T11:29:10.4944991495-001 sshd[40543]: Failed password for root from 51.75.140.153 port 44332 ssh2
...
2020-04-19 00:35:49
149.28.105.73 attack
Apr 18 15:32:46 host5 sshd[12076]: Invalid user ubuntu from 149.28.105.73 port 34590
...
2020-04-19 00:37:39
190.145.224.18 attackspam
Apr 18 12:50:13 vps46666688 sshd[22545]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.145.224.18
Apr 18 12:50:13 vps46666688 sshd[22545]: Failed password for invalid user xk from 190.145.224.18 port 43488 ssh2
...
2020-04-19 00:37:18
69.229.6.46 attackbotsspam
$f2bV_matches
2020-04-19 00:35:03
37.187.197.113 attack
Apr 18 17:50:28 wordpress wordpress(www.ruhnke.cloud)[37072]: Blocked authentication attempt for admin from ::ffff:37.187.197.113
2020-04-18 23:57:38

Recently Reported IPs

207.102.121.135 146.212.141.95 149.19.5.85 167.252.105.141
237.201.0.30 87.177.202.166 32.201.196.121 241.45.104.220
23.238.156.183 103.235.202.208 66.83.173.103 144.20.187.146
48.125.94.53 168.150.76.182 81.14.186.183 97.239.117.115
201.44.216.205 35.175.39.131 184.145.57.254 146.68.72.57