Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 22.139.148.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49933
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;22.139.148.61.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024121200 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 15:57:35 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 61.148.139.22.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.148.139.22.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.104.245.111 attack
445/tcp 445/tcp
[2020-05-01]2pkt
2020-05-02 02:46:17
104.203.242.109 attackbotsspam
29257/tcp
[2020-05-01]1pkt
2020-05-02 02:37:06
123.204.23.131 attackspam
445/tcp 445/tcp 445/tcp
[2020-05-01]3pkt
2020-05-02 02:20:07
52.130.86.7 attackspambots
May  1 15:22:53 host sshd[45898]: Invalid user nithin from 52.130.86.7 port 45160
...
2020-05-02 02:24:24
27.96.233.64 attackbots
Unauthorized connection attempt detected from IP address 27.96.233.64 to port 23 [T]
2020-05-02 02:27:46
138.86.159.44 attackbots
May 01 07:40:17 tcp        0      0 r.ca:22            138.86.159.44:34587         SYN_RECV
2020-05-02 02:38:47
162.241.225.90 attack
probing for vulnerabilities
2020-05-02 03:01:58
42.117.218.233 attack
445/tcp
[2020-05-01]1pkt
2020-05-02 02:41:20
118.22.90.253 attack
May 01 07:35:17 tcp        0      0 r.ca:22            118.22.90.253:18669         SYN_RECV
2020-05-02 02:58:50
42.247.35.1 attack
1433/tcp 1433/tcp
[2020-05-01]2pkt
2020-05-02 02:57:04
5.196.198.39 attackbots
Automatic report - Port Scan Attack
2020-05-02 03:01:23
177.238.253.44 attack
Brute forcing RDP port 3389
2020-05-02 02:21:32
152.136.186.34 attackspambots
Apr 30 00:38:05 new sshd[25079]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.186.34  user=r.r
Apr 30 00:38:07 new sshd[25079]: Failed password for r.r from 152.136.186.34 port 56566 ssh2
Apr 30 00:38:08 new sshd[25079]: Received disconnect from 152.136.186.34: 11: Bye Bye [preauth]
Apr 30 00:46:35 new sshd[27611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.186.34  user=r.r
Apr 30 00:46:37 new sshd[27611]: Failed password for r.r from 152.136.186.34 port 60252 ssh2
Apr 30 00:46:37 new sshd[27611]: Received disconnect from 152.136.186.34: 11: Bye Bye [preauth]
Apr 30 00:51:05 new sshd[28805]: Failed password for invalid user xxxxxx from 152.136.186.34 port 51236 ssh2
Apr 30 00:51:05 new sshd[28805]: Received disconnect from 152.136.186.34: 11: Bye Bye [preauth]
Apr 30 00:55:25 new sshd[30185]: Failed password for invalid user adminixxxr from 152.136.186.34 port 42228 s........
-------------------------------
2020-05-02 02:58:31
181.129.151.154 attackspambots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-02 02:22:51
140.81.228.96 attackspam
May 01 07:45:17 tcp        0      0 r.ca:22            140.81.228.96:24954         SYN_RECV
2020-05-02 02:36:06

Recently Reported IPs

170.163.125.67 148.11.219.8 146.225.249.62 17.125.5.142
20.126.138.9 21.82.132.96 43.3.113.115 35.219.230.199
180.94.233.82 156.80.23.254 169.250.137.254 29.141.20.222
146.9.199.73 254.219.241.188 35.138.10.5 172.145.27.194
177.0.0.101 136.154.7.46 59.251.164.80 157.118.250.50