Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Fujinomiya

Region: Sizuoka (Shizuoka)

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.148.34.57
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20356
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.148.34.57.			IN	A

;; AUTHORITY SECTION:
.			118	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060900 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 10 01:44:01 CST 2024
;; MSG SIZE  rcvd: 106
Host info
57.34.148.220.in-addr.arpa domain name pointer p057.net220148034.tnc.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
57.34.148.220.in-addr.arpa	name = p057.net220148034.tnc.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
197.156.81.135 attackbots
Unauthorized connection attempt from IP address 197.156.81.135 on Port 445(SMB)
2019-07-31 20:12:41
60.50.123.9 attack
Invalid user zjwjsb from 60.50.123.9 port 49768
2019-07-31 20:18:05
14.98.4.82 attackbots
Jul 31 14:00:06 site3 sshd\[130258\]: Invalid user user from 14.98.4.82
Jul 31 14:00:06 site3 sshd\[130258\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.4.82
Jul 31 14:00:09 site3 sshd\[130258\]: Failed password for invalid user user from 14.98.4.82 port 14467 ssh2
Jul 31 14:05:45 site3 sshd\[130363\]: Invalid user user7 from 14.98.4.82
Jul 31 14:05:45 site3 sshd\[130363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.98.4.82
...
2019-07-31 19:47:45
14.162.169.50 attack
Unauthorized connection attempt from IP address 14.162.169.50 on Port 445(SMB)
2019-07-31 20:12:08
128.199.83.29 attackspambots
SSH Bruteforce Attack
2019-07-31 20:05:25
185.158.175.162 attackbotsspam
Automatic report - Port Scan Attack
2019-07-31 20:04:39
67.227.213.20 attackbots
WordPress install sniffing: 
67.227.213.20 - - [30/Jul/2019:20:00:05 +0100] "GET /staging/wp-includes/wlwmanifest.xml HTTP/1.1" 404 272 "-" "-"
2019-07-31 20:23:20
37.49.227.202 attackspam
31.07.2019 11:35:43 Connection to port 81 blocked by firewall
2019-07-31 19:45:53
160.153.147.153 attackbotsspam
WordPress install sniffing: 
160.153.147.153 - - [30/Jul/2019:20:08:00 +0100] "GET /1/wp-includes/wlwmanifest.xml HTTP/1.1" 404 266 "-" "-"
2019-07-31 19:51:37
200.54.242.46 attackbots
Jul 31 13:28:00 * sshd[1729]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.54.242.46
Jul 31 13:28:02 * sshd[1729]: Failed password for invalid user gordon from 200.54.242.46 port 50720 ssh2
2019-07-31 20:14:46
77.40.2.110 attackspam
18 packets to ports 465 587
2019-07-31 19:47:09
139.59.78.236 attack
Invalid user tomcat from 139.59.78.236 port 36014
2019-07-31 20:09:20
185.232.21.28 attackspam
Bruteforcing port 3389 (Remote Desktop) - Exceed maximum 10 attempts/hour
2019-07-31 20:26:19
54.84.115.225 attackspam
xmlrpc attack
2019-07-31 20:15:46
191.53.223.245 attackbotsspam
failed_logins
2019-07-31 20:41:51

Recently Reported IPs

71.212.142.253 208.86.18.20 119.86.33.91 50.53.38.87
136.247.15.215 22.184.86.184 93.26.47.182 250.80.184.126
164.250.146.187 153.97.243.184 96.78.26.4 31.225.255.117
157.185.248.66 233.172.186.7 187.130.192.64 153.254.43.98
3.214.198.185 236.9.196.187 197.45.142.9 73.70.77.117