Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Allerød

Region: Region Hovedstaden

Country: Denmark

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.131.148.68
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31580
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.131.148.68.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:15:55 CST 2025
;; MSG SIZE  rcvd: 105
Host info
68.148.131.2.in-addr.arpa domain name pointer 002131148068.mbb.telenor.dk.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
68.148.131.2.in-addr.arpa	name = 002131148068.mbb.telenor.dk.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
188.166.247.82 attackspam
Jun 26 01:18:19 ny01 sshd[3447]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.247.82
Jun 26 01:18:21 ny01 sshd[3447]: Failed password for invalid user mack from 188.166.247.82 port 42290 ssh2
Jun 26 01:21:59 ny01 sshd[3914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.247.82
2020-06-26 13:22:40
139.215.217.180 attackspam
2020-06-26T06:54:13.933983ns386461 sshd\[30912\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180  user=root
2020-06-26T06:54:16.118041ns386461 sshd\[30912\]: Failed password for root from 139.215.217.180 port 46501 ssh2
2020-06-26T06:59:14.294313ns386461 sshd\[3009\]: Invalid user rachel from 139.215.217.180 port 39057
2020-06-26T06:59:14.299116ns386461 sshd\[3009\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.215.217.180
2020-06-26T06:59:16.802527ns386461 sshd\[3009\]: Failed password for invalid user rachel from 139.215.217.180 port 39057 ssh2
...
2020-06-26 13:40:49
47.254.47.223 attackbots
Automatic report - Banned IP Access
2020-06-26 13:51:09
35.187.23.223 attackspambots
fail2ban
2020-06-26 13:25:43
91.204.248.28 attackspam
Invalid user portail from 91.204.248.28 port 34162
2020-06-26 13:50:45
177.76.233.225 attackbotsspam
Automatic report - Port Scan Attack
2020-06-26 13:31:39
47.254.22.192 attackbotsspam
Automatic report - Banned IP Access
2020-06-26 13:49:43
142.93.74.248 attack
TCP port : 14311
2020-06-26 13:30:38
194.145.247.227 attack
Automatic report - XMLRPC Attack
2020-06-26 13:17:41
49.235.90.244 attackspam
Failed password for invalid user ubuntu from 49.235.90.244 port 56652 ssh2
2020-06-26 13:24:45
47.254.35.118 attackbotsspam
Automatic report - Banned IP Access
2020-06-26 13:51:29
128.199.89.23 attackbotsspam
Jun 26 07:12:19 journals sshd\[3513\]: Invalid user sss from 128.199.89.23
Jun 26 07:12:19 journals sshd\[3513\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.89.23
Jun 26 07:12:21 journals sshd\[3513\]: Failed password for invalid user sss from 128.199.89.23 port 11448 ssh2
Jun 26 07:20:35 journals sshd\[4515\]: Invalid user deploy from 128.199.89.23
Jun 26 07:20:35 journals sshd\[4515\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.89.23
...
2020-06-26 13:19:32
40.92.253.95 attackbots
prostitution
2020-06-26 13:48:39
222.186.173.154 attackbotsspam
Jun 26 12:35:53 itv-usvr-02 sshd[24834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.154  user=root
Jun 26 12:35:55 itv-usvr-02 sshd[24834]: Failed password for root from 222.186.173.154 port 44964 ssh2
2020-06-26 13:47:12
37.187.99.147 attackbotsspam
ssh brute force
2020-06-26 13:28:00

Recently Reported IPs

18.164.11.56 18.195.86.238 251.63.14.99 22.224.67.94
46.208.90.49 166.15.223.104 69.114.226.244 81.27.50.64
171.192.174.107 189.109.99.57 78.29.102.181 62.80.101.205
130.167.126.141 229.116.225.175 164.11.149.12 243.28.225.90
126.217.228.25 145.135.29.110 99.125.242.8 156.89.94.215