Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.148.104.21
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60256
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.148.104.21.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 15:07:17 CST 2025
;; MSG SIZE  rcvd: 107
Host info
21.104.148.220.in-addr.arpa domain name pointer 21.net220148104.t-com.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
21.104.148.220.in-addr.arpa	name = 21.net220148104.t-com.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
111.229.167.91 attackspam
SSH Brute-Force attacks
2020-06-18 17:10:34
103.94.69.50 attack
20/6/17@23:50:36: FAIL: Alarm-Network address from=103.94.69.50
20/6/17@23:50:36: FAIL: Alarm-Network address from=103.94.69.50
...
2020-06-18 17:22:50
37.0.20.10 attack
IP: 37.0.20.10
Ports affected
    Simple Mail Transfer (25) 
Abuse Confidence rating 100%
Found in DNSBL('s)
ASN Details
   AS35467 DataDiensten Fryslan B.V.
   Netherlands (NL)
   CIDR 37.0.16.0/21
Log Date: 18/06/2020 7:35:17 AM UTC
2020-06-18 17:06:00
185.194.49.132 attack
Jun 18 02:32:50 server1 sshd\[6211\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.194.49.132  user=root
Jun 18 02:32:52 server1 sshd\[6211\]: Failed password for root from 185.194.49.132 port 56205 ssh2
Jun 18 02:36:12 server1 sshd\[8811\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.194.49.132  user=root
Jun 18 02:36:13 server1 sshd\[8811\]: Failed password for root from 185.194.49.132 port 56121 ssh2
Jun 18 02:39:20 server1 sshd\[12283\]: Invalid user monitor from 185.194.49.132
Jun 18 02:39:20 server1 sshd\[12283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.194.49.132 
Jun 18 02:39:22 server1 sshd\[12283\]: Failed password for invalid user monitor from 185.194.49.132 port 56035 ssh2
...
2020-06-18 17:05:00
61.177.172.41 attack
SSH brutforce
2020-06-18 17:20:43
46.38.150.193 attackspam
Jun 18 10:43:30 srv01 postfix/smtpd\[14876\]: warning: unknown\[46.38.150.193\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 10:43:39 srv01 postfix/smtpd\[29027\]: warning: unknown\[46.38.150.193\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 10:43:42 srv01 postfix/smtpd\[8072\]: warning: unknown\[46.38.150.193\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 10:43:54 srv01 postfix/smtpd\[14876\]: warning: unknown\[46.38.150.193\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 10:44:25 srv01 postfix/smtpd\[14876\]: warning: unknown\[46.38.150.193\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-18 16:47:21
116.247.81.99 attackbotsspam
2020-06-18T10:21:04.922064vps773228.ovh.net sshd[12623]: Failed password for invalid user ts3server from 116.247.81.99 port 54504 ssh2
2020-06-18T10:24:15.683583vps773228.ovh.net sshd[12631]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.99  user=root
2020-06-18T10:24:17.514549vps773228.ovh.net sshd[12631]: Failed password for root from 116.247.81.99 port 52959 ssh2
2020-06-18T10:27:26.592153vps773228.ovh.net sshd[12691]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.247.81.99  user=centos
2020-06-18T10:27:28.643802vps773228.ovh.net sshd[12691]: Failed password for centos from 116.247.81.99 port 51150 ssh2
...
2020-06-18 16:54:40
51.38.188.63 attackbots
Jun 18 09:25:39 ns382633 sshd\[23774\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.63  user=root
Jun 18 09:25:42 ns382633 sshd\[23774\]: Failed password for root from 51.38.188.63 port 55576 ssh2
Jun 18 09:30:29 ns382633 sshd\[24949\]: Invalid user work from 51.38.188.63 port 35916
Jun 18 09:30:29 ns382633 sshd\[24949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.188.63
Jun 18 09:30:31 ns382633 sshd\[24949\]: Failed password for invalid user work from 51.38.188.63 port 35916 ssh2
2020-06-18 17:01:20
141.98.9.157 attackbots
2020-06-18T09:04:00.889873abusebot-8.cloudsearch.cf sshd[1522]: Invalid user admin from 141.98.9.157 port 41015
2020-06-18T09:04:00.899072abusebot-8.cloudsearch.cf sshd[1522]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157
2020-06-18T09:04:00.889873abusebot-8.cloudsearch.cf sshd[1522]: Invalid user admin from 141.98.9.157 port 41015
2020-06-18T09:04:02.814790abusebot-8.cloudsearch.cf sshd[1522]: Failed password for invalid user admin from 141.98.9.157 port 41015 ssh2
2020-06-18T09:04:29.851309abusebot-8.cloudsearch.cf sshd[1559]: Invalid user test from 141.98.9.157 port 39615
2020-06-18T09:04:29.858300abusebot-8.cloudsearch.cf sshd[1559]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.157
2020-06-18T09:04:29.851309abusebot-8.cloudsearch.cf sshd[1559]: Invalid user test from 141.98.9.157 port 39615
2020-06-18T09:04:32.089911abusebot-8.cloudsearch.cf sshd[1559]: Failed password for inv
...
2020-06-18 17:17:06
60.248.61.78 attackbotsspam
Port probing on unauthorized port 8000
2020-06-18 17:13:03
185.143.72.23 attackbotsspam
Jun 18 10:39:24 srv01 postfix/smtpd\[12322\]: warning: unknown\[185.143.72.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 10:39:31 srv01 postfix/smtpd\[12919\]: warning: unknown\[185.143.72.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 10:39:35 srv01 postfix/smtpd\[14637\]: warning: unknown\[185.143.72.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 10:39:54 srv01 postfix/smtpd\[14885\]: warning: unknown\[185.143.72.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 10:40:18 srv01 postfix/smtpd\[12919\]: warning: unknown\[185.143.72.23\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-18 16:44:55
172.105.222.201 attack
Lines containing failures of 172.105.222.201 (max 1000)
Jun 18 11:52:07 f sshd[1031839]: Invalid user abhay from 172.105.222.201 port 61354
Jun 18 11:52:07 f sshd[1031839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.105.222.201 
Jun 18 11:52:09 f sshd[1031839]: Failed password for invalid user abhay from 172.105.222.201 port 61354 ssh2
Jun 18 11:52:09 f sshd[1031839]: Received disconnect from 172.105.222.201 port 61354:11: Bye Bye [preauth]
Jun 18 11:52:09 f sshd[1031839]: Disconnected from invalid user abhay 172.105.222.201 port 61354 [preauth]
Jun 18 11:56:46 f sshd[1031934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.105.222.201  user=r.r
Jun 18 11:56:48 f sshd[1031934]: Failed password for r.r from 172.105.222.201 port 21898 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=172.105.222.201
2020-06-18 17:21:00
140.143.57.195 attackbots
2020-06-18T11:07:17.392505vps751288.ovh.net sshd\[21850\]: Invalid user jobs from 140.143.57.195 port 47956
2020-06-18T11:07:17.400929vps751288.ovh.net sshd\[21850\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.57.195
2020-06-18T11:07:19.361787vps751288.ovh.net sshd\[21850\]: Failed password for invalid user jobs from 140.143.57.195 port 47956 ssh2
2020-06-18T11:11:17.477603vps751288.ovh.net sshd\[21896\]: Invalid user cnt from 140.143.57.195 port 37974
2020-06-18T11:11:17.488262vps751288.ovh.net sshd\[21896\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.57.195
2020-06-18 17:21:44
46.38.145.6 attackspambots
Jun 18 10:43:02 v22019058497090703 postfix/smtpd[11199]: warning: unknown[46.38.145.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 10:44:23 v22019058497090703 postfix/smtpd[11199]: warning: unknown[46.38.145.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 18 10:45:48 v22019058497090703 postfix/smtpd[11199]: warning: unknown[46.38.145.6]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-18 16:48:53
162.252.57.173 attackbots
2020-06-18T07:46:58.681612ionos.janbro.de sshd[1576]: Invalid user sales from 162.252.57.173 port 25788
2020-06-18T07:47:00.083128ionos.janbro.de sshd[1576]: Failed password for invalid user sales from 162.252.57.173 port 25788 ssh2
2020-06-18T07:50:02.412375ionos.janbro.de sshd[1596]: Invalid user ts from 162.252.57.173 port 25916
2020-06-18T07:50:02.483944ionos.janbro.de sshd[1596]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.57.173
2020-06-18T07:50:02.412375ionos.janbro.de sshd[1596]: Invalid user ts from 162.252.57.173 port 25916
2020-06-18T07:50:04.471043ionos.janbro.de sshd[1596]: Failed password for invalid user ts from 162.252.57.173 port 25916 ssh2
2020-06-18T07:53:16.152264ionos.janbro.de sshd[1623]: Invalid user timemachine from 162.252.57.173 port 26038
2020-06-18T07:53:16.225258ionos.janbro.de sshd[1623]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.57.173
2020-06-18T07:5
...
2020-06-18 17:07:28

Recently Reported IPs

216.205.238.54 162.171.115.112 205.104.9.227 106.49.200.173
130.67.166.157 59.236.9.255 243.169.47.109 53.189.120.82
69.140.90.180 46.140.16.57 62.34.28.225 154.88.209.19
239.117.134.96 171.222.88.130 38.158.84.118 75.98.68.64
247.55.55.61 34.135.161.96 151.154.51.84 115.17.140.125