Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.254.148.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6638
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.254.148.57.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 192 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 12:42:36 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 57.148.254.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 57.148.254.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.8 attackbots
Jun  7 00:42:15 vpn01 sshd[29761]: Failed password for root from 222.186.180.8 port 47482 ssh2
Jun  7 00:42:27 vpn01 sshd[29761]: error: maximum authentication attempts exceeded for root from 222.186.180.8 port 47482 ssh2 [preauth]
...
2020-06-07 06:51:09
87.19.98.104 attackspam
Automatic report - Port Scan Attack
2020-06-07 06:46:02
190.12.30.2 attackspambots
reported through recidive - multiple failed attempts(SSH)
2020-06-07 06:59:00
64.225.64.215 attackspambots
$f2bV_matches
2020-06-07 07:08:12
106.12.6.195 attackspam
reported through recidive - multiple failed attempts(SSH)
2020-06-07 06:58:06
68.183.31.167 attackbotsspam
xmlrpc attack
2020-06-07 07:06:15
177.158.199.137 attackbotsspam
Automatic report - Port Scan Attack
2020-06-07 06:44:30
221.133.231.10 attackspambots
Jun  5 03:23:52 srv05 sshd[32309]: Address 221.133.231.10 maps to mail.highway-noc.com.cn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun  5 03:23:52 srv05 sshd[32309]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.133.231.10  user=r.r
Jun  5 03:23:54 srv05 sshd[32309]: Failed password for r.r from 221.133.231.10 port 43707 ssh2
Jun  5 03:23:54 srv05 sshd[32309]: Received disconnect from 221.133.231.10: 11: Bye Bye [preauth]
Jun  5 03:28:18 srv05 sshd[32561]: Address 221.133.231.10 maps to mail.highway-noc.com.cn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jun  5 03:28:18 srv05 sshd[32561]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.133.231.10  user=r.r
Jun  5 03:28:20 srv05 sshd[32561]: Failed password for r.r from 221.133.231.10 port 45238 ssh2
Jun  5 03:28:20 srv05 sshd[32561]: Received disconnect from 221.133.231.10: ........
-------------------------------
2020-06-07 06:43:15
168.90.224.91 attack
Automatic report - XMLRPC Attack
2020-06-07 06:43:55
203.217.140.77 attackspambots
reported through recidive - multiple failed attempts(SSH)
2020-06-07 06:56:28
103.218.242.29 attackbotsspam
16. On Jun 6 2020 experienced a Brute Force SSH login attempt -> 13 unique times by 103.218.242.29.
2020-06-07 07:15:08
117.50.20.11 attack
Jun  7 00:33:29 server sshd[3968]: Failed password for root from 117.50.20.11 port 37144 ssh2
Jun  7 00:36:48 server sshd[4264]: Failed password for root from 117.50.20.11 port 32882 ssh2
...
2020-06-07 07:14:23
88.214.26.13 attack
24 attempts against mh-misbehave-ban on sonic
2020-06-07 06:39:28
122.117.59.165 attackbotsspam
Port probing on unauthorized port 8080
2020-06-07 06:43:01
109.168.66.27 attackbots
Jun  7 05:48:13 webhost01 sshd[2181]: Failed password for root from 109.168.66.27 port 59412 ssh2
...
2020-06-07 06:55:17

Recently Reported IPs

58.220.242.253 107.207.183.157 13.133.148.174 184.165.181.62
212.150.65.233 9.136.192.43 214.18.191.16 89.238.29.96
127.252.240.138 250.134.102.117 57.173.212.18 233.219.209.9
174.204.152.157 87.62.50.105 81.142.136.128 21.223.47.173
145.132.106.87 171.4.23.176 209.108.68.251 161.208.185.36