Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.148.51.240
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49572
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.148.51.240.			IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031200 1800 900 604800 86400

;; Query time: 138 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 17:24:16 CST 2022
;; MSG SIZE  rcvd: 105
Host info
240.51.148.2.in-addr.arpa domain name pointer 2.148.51.240.tmi.telenormobil.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
240.51.148.2.in-addr.arpa	name = 2.148.51.240.tmi.telenormobil.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
134.122.134.228 attack
Banned for a week because repeated abuses, for example SSH, but not only
2020-08-10 18:04:24
203.158.177.149 attackbotsspam
Aug 10 08:33:37 vps333114 sshd[2595]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.158.177.149  user=root
Aug 10 08:33:38 vps333114 sshd[2595]: Failed password for root from 203.158.177.149 port 33352 ssh2
...
2020-08-10 17:59:03
200.38.227.220 attack
Automatic report - Port Scan Attack
2020-08-10 17:51:57
192.99.4.59 attackbots
192.99.4.59 - - [10/Aug/2020:10:44:00 +0100] "POST /wp-login.php HTTP/1.1" 200 6287 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.4.59 - - [10/Aug/2020:10:46:41 +0100] "POST /wp-login.php HTTP/1.1" 200 6287 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
192.99.4.59 - - [10/Aug/2020:10:49:28 +0100] "POST /wp-login.php HTTP/1.1" 200 6287 "-" "Mozilla/5.0 (Windows NT 10.0; WOW64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/46.0.2490.80 Safari/537.36"
...
2020-08-10 17:57:11
185.39.11.105 attackbotsspam
Unauthorized connection attempt detected from IP address 185.39.11.105 to port 80 [T]
2020-08-10 17:57:33
186.3.135.196 attackspam
firewall-block, port(s): 23/tcp
2020-08-10 17:50:07
78.188.71.193 attack
Automatic report - Banned IP Access
2020-08-10 17:47:43
221.182.204.114 attackbots
Dovecot Invalid User Login Attempt.
2020-08-10 18:08:42
168.138.221.133 attackbotsspam
2020-08-09 UTC: (2x) - root(2x)
2020-08-10 17:50:24
81.231.13.172 attackbotsspam
Aug 10 06:49:42 ift sshd\[46422\]: Failed password for invalid user admin from 81.231.13.172 port 53701 ssh2Aug 10 06:49:44 ift sshd\[46426\]: Failed password for invalid user admin from 81.231.13.172 port 53788 ssh2Aug 10 06:49:47 ift sshd\[46449\]: Failed password for invalid user admin from 81.231.13.172 port 53819 ssh2Aug 10 06:49:49 ift sshd\[46455\]: Failed password for invalid user admin from 81.231.13.172 port 53925 ssh2Aug 10 06:49:52 ift sshd\[46459\]: Failed password for invalid user admin from 81.231.13.172 port 54012 ssh2
...
2020-08-10 18:07:03
165.22.31.24 attack
165.22.31.24 - - [10/Aug/2020:04:50:10 +0100] "POST /wp-login.php HTTP/1.1" 200 1969 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.31.24 - - [10/Aug/2020:04:50:10 +0100] "POST /wp-login.php HTTP/1.1" 200 1954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
165.22.31.24 - - [10/Aug/2020:04:50:11 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-10 17:53:30
76.184.5.254 attackspam
DATE:2020-08-10 05:49:51, IP:76.184.5.254, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-08-10 17:58:40
106.13.45.212 attackspambots
Aug 10 06:51:55 pve1 sshd[24414]: Failed password for root from 106.13.45.212 port 51342 ssh2
...
2020-08-10 17:44:52
49.88.112.76 attackbotsspam
Aug 10 04:48:13 powerhouse sshd[696868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.76  user=root
Aug 10 04:48:15 powerhouse sshd[696868]: Failed password for root from 49.88.112.76 port 43777 ssh2
...
2020-08-10 18:05:56
192.144.234.204 attackspam
2020-08-10T10:11:36.874466centos sshd[2838]: Failed password for root from 192.144.234.204 port 51974 ssh2
2020-08-10T10:14:08.137274centos sshd[3304]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.234.204  user=root
2020-08-10T10:14:10.039561centos sshd[3304]: Failed password for root from 192.144.234.204 port 60070 ssh2
...
2020-08-10 17:29:53

Recently Reported IPs

169.145.199.250 28.245.247.35 132.240.227.38 81.160.23.33
78.108.243.237 78.108.243.234 47.29.251.64 78.157.11.222
36.56.106.0 96.197.209.205 8.95.39.151 110.251.18.104
31.220.1.72 3.228.1.105 163.180.95.33 139.178.69.15
239.69.110.47 15.177.213.125 185.255.44.1 182.118.81.206