Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Tokyo

Region: Tokyo

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.148.120.241
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23404
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;220.148.120.241.		IN	A

;; AUTHORITY SECTION:
.			534	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082501 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 26 07:56:30 CST 2020
;; MSG SIZE  rcvd: 119
Host info
241.120.148.220.in-addr.arpa domain name pointer 241.net220148120.t-com.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
241.120.148.220.in-addr.arpa	name = 241.net220148120.t-com.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.178.162 attack
firewall-block, port(s): 18616/tcp
2020-07-01 18:04:46
218.161.28.135 attackbots
unauthorized connection attempt
2020-07-01 17:38:58
123.49.47.26 attackspam
Jun 30 17:58:28 ns381471 sshd[24332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.49.47.26
Jun 30 17:58:30 ns381471 sshd[24332]: Failed password for invalid user ctopup from 123.49.47.26 port 60932 ssh2
2020-07-01 17:34:45
176.97.37.141 attackspambots
Jun 30 20:21:34  sshd\[22630\]: Invalid user webmin from 176.97.37.141Jun 30 20:21:37  sshd\[22630\]: Failed password for invalid user webmin from 176.97.37.141 port 56192 ssh2
...
2020-07-01 18:04:06
1.34.20.62 attackspambots
23/tcp
[2020-06-28]1pkt
2020-07-01 17:43:28
106.13.99.145 attack
...
2020-07-01 17:21:51
14.177.181.42 attackspambots
Unauthorized connection attempt from IP address 14.177.181.42 on Port 445(SMB)
2020-07-01 17:41:58
103.104.117.81 attackbotsspam
2020-06-30T19:13:04.541455mail.broermann.family sshd[30679]: Failed password for root from 103.104.117.81 port 50296 ssh2
2020-06-30T19:16:25.252543mail.broermann.family sshd[30966]: Invalid user user0 from 103.104.117.81 port 60070
2020-06-30T19:16:25.256894mail.broermann.family sshd[30966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.117.81
2020-06-30T19:16:25.252543mail.broermann.family sshd[30966]: Invalid user user0 from 103.104.117.81 port 60070
2020-06-30T19:16:27.102152mail.broermann.family sshd[30966]: Failed password for invalid user user0 from 103.104.117.81 port 60070 ssh2
...
2020-07-01 18:02:19
60.22.117.45 attackbots
23/tcp
[2020-06-30]1pkt
2020-07-01 17:16:06
219.73.1.122 attackspambots
Honeypot attack, port: 5555, PTR: n219073001122.netvigator.com.
2020-07-01 17:30:20
27.184.131.238 attackbotsspam
Unauthorized connection attempt detected from IP address 27.184.131.238 to port 23
2020-07-01 17:29:49
62.6.218.123 attackspambots
unauthorized connection attempt
2020-07-01 17:18:57
78.138.188.187 attackbotsspam
20 attempts against mh-ssh on cloud
2020-07-01 17:33:26
67.225.190.237 attackbots
$f2bV_matches
2020-07-01 17:55:30
77.42.88.160 attackbotsspam
Automatic report - Port Scan Attack
2020-07-01 17:58:57

Recently Reported IPs

81.67.45.55 158.101.148.194 182.52.95.159 177.201.1.236
80.95.188.249 116.29.66.97 1.78.25.42 169.204.49.8
36.196.6.216 65.128.111.217 74.246.47.40 40.89.16.103
31.131.150.49 93.78.254.157 108.124.120.143 79.212.50.167
107.20.0.225 75.167.46.12 80.133.187.166 179.254.169.18