Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seo-gu

Region: Daejeon Metropolitan City

Country: South Korea

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.158.135.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35659
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.158.135.148.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025050301 1800 900 604800 86400

;; Query time: 238 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun May 04 04:00:06 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 148.135.158.221.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.135.158.221.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.209.0.91 attackspambots
11/25/2019-16:47:16.073884 185.209.0.91 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-25 23:52:23
1.0.136.125 attackspam
firewall-block, port(s): 23/tcp
2019-11-26 00:06:11
113.141.70.199 attackbots
2019-11-25T09:30:30.713255ns547587 sshd\[14741\]: Invalid user ching from 113.141.70.199 port 45860
2019-11-25T09:30:30.719096ns547587 sshd\[14741\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.141.70.199
2019-11-25T09:30:32.670718ns547587 sshd\[14741\]: Failed password for invalid user ching from 113.141.70.199 port 45860 ssh2
2019-11-25T09:39:44.037159ns547587 sshd\[18312\]: Invalid user www from 113.141.70.199 port 49928
...
2019-11-26 00:14:21
37.59.224.39 attackspam
2019-11-25T15:30:39.646285shield sshd\[24752\]: Invalid user rajamal from 37.59.224.39 port 33320
2019-11-25T15:30:39.651425shield sshd\[24752\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.224.39
2019-11-25T15:30:42.054505shield sshd\[24752\]: Failed password for invalid user rajamal from 37.59.224.39 port 33320 ssh2
2019-11-25T15:37:00.230893shield sshd\[26462\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.59.224.39  user=root
2019-11-25T15:37:02.272545shield sshd\[26462\]: Failed password for root from 37.59.224.39 port 51180 ssh2
2019-11-25 23:41:19
176.57.217.251 attack
Fail2Ban Ban Triggered
2019-11-25 23:33:47
181.177.244.68 attackspam
Triggered by Fail2Ban at Vostok web server
2019-11-26 00:01:30
218.92.0.170 attackspambots
Nov 25 17:03:48 sso sshd[4699]: Failed password for root from 218.92.0.170 port 6888 ssh2
Nov 25 17:03:51 sso sshd[4699]: Failed password for root from 218.92.0.170 port 6888 ssh2
...
2019-11-26 00:08:19
218.92.0.187 attackspam
Nov 25 15:36:43 venus sshd\[31609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.187  user=root
Nov 25 15:36:44 venus sshd\[31609\]: Failed password for root from 218.92.0.187 port 43582 ssh2
Nov 25 15:36:48 venus sshd\[31609\]: Failed password for root from 218.92.0.187 port 43582 ssh2
...
2019-11-25 23:37:37
159.203.193.44 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-25 23:52:51
118.98.121.195 attack
Nov 25 16:44:12 MK-Soft-Root2 sshd[28769]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.98.121.195 
Nov 25 16:44:14 MK-Soft-Root2 sshd[28769]: Failed password for invalid user pa55w0rd from 118.98.121.195 port 33608 ssh2
...
2019-11-26 00:12:16
192.223.31.219 attackbots
quessing password
2019-11-26 00:16:53
218.92.0.157 attack
Nov 25 16:31:29 odroid64 sshd\[12283\]: User root from 218.92.0.157 not allowed because not listed in AllowUsers
Nov 25 16:31:29 odroid64 sshd\[12283\]: Failed none for invalid user root from 218.92.0.157 port 56521 ssh2
...
2019-11-25 23:32:03
122.228.19.80 attackspam
25.11.2019 15:55:37 Connection to port 3689 blocked by firewall
2019-11-25 23:52:03
194.180.224.100 attack
Nov 25 10:57:34 bilbo sshd[32434]: User root from 194.180.224.100 not allowed because not listed in AllowUsers
Nov 25 10:57:34 bilbo sshd[32436]: User root from 194.180.224.100 not allowed because not listed in AllowUsers
Nov 25 10:57:36 bilbo sshd[32438]: User root from 194.180.224.100 not allowed because not listed in AllowUsers
Nov 25 10:57:37 bilbo sshd[32440]: Invalid user admin from 194.180.224.100
...
2019-11-25 23:59:33
222.120.192.122 attack
2019-11-25T15:57:49.967135abusebot-5.cloudsearch.cf sshd\[28496\]: Invalid user hp from 222.120.192.122 port 55396
2019-11-26 00:06:44

Recently Reported IPs

24.202.89.165 107.170.20.116 52.167.144.145 45.58.159.237
147.185.132.243 134.195.158.139 128.199.9.235 43.130.110.130
119.83.83.79 67.1.230.41 47.88.14.121 185.57.65.117
118.123.1.38 217.173.203.82 20.46.225.79 162.216.149.124
86.126.81.211 2.189.129.83 172.96.160.15 177.185.117.136