Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.109.75.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10706
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.109.75.148.			IN	A

;; AUTHORITY SECTION:
.			579	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021122800 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 28 21:45:22 CST 2021
;; MSG SIZE  rcvd: 107
Host info
148.75.109.221.in-addr.arpa domain name pointer softbank221109075148.bbtec.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.75.109.221.in-addr.arpa	name = softbank221109075148.bbtec.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.52.219.2 attackspam
Sent mail to former whois address of a deleted domain.
2019-11-21 19:28:08
92.119.160.52 attack
92.119.160.52 was recorded 59 times by 18 hosts attempting to connect to the following ports: 43158,60570,34742,25845,56155,58029,36136,43230,27464,32327,35825,60604,53287,42750,42129,42480,65216,35494,55045,53779,28453,60757,52151,52937,53953,25654,38450,43633. Incident counter (4h, 24h, all-time): 59, 430, 4564
2019-11-21 19:41:47
85.132.79.170 attack
Honeypot attack, port: 445, PTR: PTR record not found
2019-11-21 19:26:42
219.250.188.2 attackspambots
6379/tcp
[2019-11-21]1pkt
2019-11-21 19:53:52
182.176.121.85 attackspam
Automatic report - Banned IP Access
2019-11-21 19:43:07
114.67.95.49 attackspambots
Nov 21 17:19:15 itv-usvr-01 sshd[16610]: Invalid user admin from 114.67.95.49
Nov 21 17:19:15 itv-usvr-01 sshd[16610]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.95.49
Nov 21 17:19:15 itv-usvr-01 sshd[16610]: Invalid user admin from 114.67.95.49
Nov 21 17:19:17 itv-usvr-01 sshd[16610]: Failed password for invalid user admin from 114.67.95.49 port 55254 ssh2
2019-11-21 19:19:01
119.86.182.79 attackspam
Nov 20 06:40:20 penfold postfix/smtpd[8227]: connect from unknown[119.86.182.79]
Nov x@x
Nov x@x
Nov x@x
Nov 20 06:40:22 penfold postfix/smtpd[8227]: disconnect from unknown[119.86.182.79] helo=1 mail=1 rcpt=0/3 quhostname=1 commands=3/6
Nov 20 06:40:25 penfold postfix/smtpd[8227]: connect from unknown[119.86.182.79]
Nov 20 06:40:26 penfold postfix/smtpd[8227]: 1D048205A2: client=unknown[119.86.182.79]
Nov x@x
Nov x@x
Nov 20 06:40:33 penfold opendkim[2690]: 1D048205A2: [119.86.182.79] [119.86.182.79] not internal
Nov 20 06:40:34 penfold postfix/smtpd[8227]: disconnect from unknown[119.86.182.79] helo=1 mail=1 rcpt=5/7 data=1 quhostname=1 commands=9/11
Nov 20 06:42:52 penfold postfix/smtpd[7514]: connect from unknown[119.86.182.79]
Nov 20 06:42:54 penfold postfix/smtpd[7514]: 4B1C5205A2: client=unknown[119.86.182.79]
Nov 20 06:43:10 penfold opendkim[2690]: 4B1C5205A2: [119.86.182.79] [119.86.182.79] not internal
Nov 20 06:43:10 penfold postfix/smtpd[1242]: connect from u........
-------------------------------
2019-11-21 19:55:08
222.186.30.59 attackbots
2019-11-20 UTC: 4x - root(4x)
2019-11-21 19:55:58
201.211.212.240 attackspambots
Port 1433 Scan
2019-11-21 19:25:25
206.189.122.133 attackbots
$f2bV_matches
2019-11-21 19:38:17
192.81.216.31 attack
$f2bV_matches
2019-11-21 19:53:10
94.176.17.27 attack
(Nov 21)  LEN=56 TTL=115 ID=23534 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 21)  LEN=56 TTL=113 ID=27766 DF TCP DPT=1433 WINDOW=8192 SYN 
 (Nov 21)  LEN=60 TTL=113 ID=23937 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 20)  LEN=60 TTL=113 ID=22098 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 20)  LEN=60 TTL=117 ID=28980 DF TCP DPT=1433 WINDOW=8192 SYN 
 (Nov 19)  LEN=60 TTL=117 ID=9831 DF TCP DPT=1433 WINDOW=8192 SYN 
 (Nov 19)  LEN=60 TTL=115 ID=6108 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 19)  LEN=60 TTL=117 ID=14855 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 19)  LEN=60 TTL=115 ID=25352 DF TCP DPT=1433 WINDOW=8192 SYN 
 (Nov 19)  LEN=60 TTL=115 ID=25703 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 19)  LEN=60 TTL=114 ID=26917 DF TCP DPT=1433 WINDOW=8192 SYN 
 (Nov 19)  LEN=60 TTL=115 ID=23092 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 19)  LEN=60 TTL=117 ID=29099 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 19)  LEN=60 TTL=113 ID=16444 DF TCP DPT=445 WINDOW=8192 SYN 
 (Nov 19)  LEN=60 TTL=115 ID=4461 DF TCP DPT=1433 WINDOW=81...
2019-11-21 19:28:43
46.217.248.22 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-21 19:25:10
79.125.183.2 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-11-21 19:33:38
61.145.61.7 attackspambots
2019-11-21T10:58:39.596993shield sshd\[4006\]: Invalid user pass from 61.145.61.7 port 8799
2019-11-21T10:58:39.601613shield sshd\[4006\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.145.61.7
2019-11-21T10:58:42.359972shield sshd\[4006\]: Failed password for invalid user pass from 61.145.61.7 port 8799 ssh2
2019-11-21T11:02:44.030503shield sshd\[4487\]: Invalid user dialyser from 61.145.61.7 port 10361
2019-11-21T11:02:44.035601shield sshd\[4487\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.145.61.7
2019-11-21 19:15:41

Recently Reported IPs

94.68.178.89 127.33.46.150 212.81.150.67 100.3.49.59
164.248.182.179 59.6.176.241 165.142.188.227 201.75.10.91
86.189.222.230 113.236.87.1 153.150.75.223 107.11.236.175
243.54.136.154 94.40.110.194 139.39.161.141 218.165.70.238
162.255.119.132 52.81.189.53 193.168.8.12 94.63.31.139