Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.148.149.128
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24624
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;213.148.149.128.		IN	A

;; AUTHORITY SECTION:
.			221	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020060701 1800 900 604800 86400

;; Query time: 81 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 08 04:06:37 CST 2020
;; MSG SIZE  rcvd: 119
Host info
128.149.148.213.in-addr.arpa domain name pointer port-213-148-149-128.static.as20676.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
128.149.148.213.in-addr.arpa	name = port-213-148-149-128.static.as20676.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
203.160.91.226 attackbotsspam
Nov 25 17:15:10 dallas01 sshd[8385]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.91.226
Nov 25 17:15:12 dallas01 sshd[8385]: Failed password for invalid user yx from 203.160.91.226 port 60068 ssh2
Nov 25 17:22:45 dallas01 sshd[9931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.160.91.226
2020-01-28 21:27:42
123.4.244.84 attack
unauthorized connection attempt
2020-01-28 21:40:23
190.77.159.197 attack
unauthorized connection attempt
2020-01-28 21:19:45
185.41.248.172 attack
unauthorized connection attempt
2020-01-28 21:36:21
171.103.55.210 attackbotsspam
unauthorized connection attempt
2020-01-28 21:37:56
144.139.171.97 attackspam
unauthorized connection attempt
2020-01-28 21:15:32
153.220.100.45 attack
unauthorized connection attempt
2020-01-28 21:38:52
156.215.162.182 attack
unauthorized connection attempt
2020-01-28 21:38:28
103.80.210.113 attackspambots
unauthorized connection attempt
2020-01-28 21:22:52
120.60.239.104 attackbotsspam
unauthorized connection attempt
2020-01-28 21:08:41
113.87.164.226 attack
unauthorized connection attempt
2020-01-28 21:42:20
45.229.53.251 attackspam
unauthorized connection attempt
2020-01-28 21:25:33
187.178.24.31 attackspam
unauthorized connection attempt
2020-01-28 21:35:23
88.190.148.189 attackspam
Unauthorized connection attempt detected from IP address 88.190.148.189 to port 6379 [J]
2020-01-28 21:24:04
177.73.3.47 attack
Unauthorized connection attempt detected from IP address 177.73.3.47 to port 80 [J]
2020-01-28 21:21:04

Recently Reported IPs

118.100.241.238 136.169.130.150 14.225.8.154 70.182.79.65
36.91.212.193 27.71.136.219 200.6.193.44 119.96.189.177
195.99.149.42 94.139.177.28 88.80.148.186 37.120.164.249
177.130.160.245 103.83.246.165 164.132.3.146 84.183.212.155
206.81.12.17 161.117.234.185 177.86.148.52 138.219.223.218