Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Utase

Region: Tiba (Chiba)

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.248.58.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31982
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.248.58.90.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 12:31:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
90.58.248.221.in-addr.arpa domain name pointer 221x248x58x90.ap221.ftth.ucom.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
90.58.248.221.in-addr.arpa	name = 221x248x58x90.ap221.ftth.ucom.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.73.59 attackspambots
[ssh] SSH attack
2020-06-04 21:52:45
93.174.93.68 attack
Drop-BlasterVariant-p4444-TCP | Jun/03/2020 12:20:08
2020-06-04 21:32:19
181.188.176.153 attackspam
Automatic report - Port Scan Attack
2020-06-04 21:14:49
116.196.93.81 attackbots
Jun  4 18:21:44 gw1 sshd[6775]: Failed password for root from 116.196.93.81 port 35720 ssh2
...
2020-06-04 21:38:45
91.121.221.195 attackspam
Jun  4 08:08:16 mail sshd\[33110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.221.195  user=root
...
2020-06-04 21:48:49
45.124.86.65 attack
Jun  4 14:04:44 pornomens sshd\[1738\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.124.86.65  user=root
Jun  4 14:04:46 pornomens sshd\[1738\]: Failed password for root from 45.124.86.65 port 33604 ssh2
Jun  4 14:08:35 pornomens sshd\[1769\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.124.86.65  user=root
...
2020-06-04 21:36:49
129.204.250.129 attack
Jun  4 14:26:56 vserver sshd\[27996\]: Failed password for root from 129.204.250.129 port 51568 ssh2Jun  4 14:30:19 vserver sshd\[28031\]: Failed password for root from 129.204.250.129 port 58924 ssh2Jun  4 14:33:37 vserver sshd\[28081\]: Failed password for root from 129.204.250.129 port 38096 ssh2Jun  4 14:36:54 vserver sshd\[28419\]: Failed password for root from 129.204.250.129 port 45438 ssh2
...
2020-06-04 21:52:19
113.110.234.56 attackbotsspam
Lines containing failures of 113.110.234.56
Jun  2 15:58:43 shared03 sshd[23643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.110.234.56  user=r.r
Jun  2 15:58:45 shared03 sshd[23643]: Failed password for r.r from 113.110.234.56 port 39785 ssh2
Jun  2 15:58:45 shared03 sshd[23643]: Received disconnect from 113.110.234.56 port 39785:11: Bye Bye [preauth]
Jun  2 15:58:45 shared03 sshd[23643]: Disconnected from authenticating user r.r 113.110.234.56 port 39785 [preauth]
Jun  2 16:02:10 shared03 sshd[25242]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.110.234.56  user=r.r
Jun  2 16:02:12 shared03 sshd[25242]: Failed password for r.r from 113.110.234.56 port 39171 ssh2
Jun  2 16:02:12 shared03 sshd[25242]: Received disconnect from 113.110.234.56 port 39171:11: Bye Bye [preauth]
Jun  2 16:02:12 shared03 sshd[25242]: Disconnected from authenticating user r.r 113.110.234.56 port 39171........
------------------------------
2020-06-04 21:58:48
49.235.140.92 attack
49.235.140.92 - - [04/Jun/2020:14:08:13 +0200] "GET /wp-login.php HTTP/1.1" 200 6364 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
49.235.140.92 - - [04/Jun/2020:14:08:17 +0200] "POST /wp-login.php HTTP/1.1" 200 6669 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
49.235.140.92 - - [04/Jun/2020:14:08:21 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-04 21:46:47
42.115.148.131 attackbots
Unauthorized connection attempt from IP address 42.115.148.131 on Port 445(SMB)
2020-06-04 21:18:34
80.82.65.74 attack
Jun  4 15:27:07 debian-2gb-nbg1-2 kernel: \[13535985.319318\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=80.82.65.74 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=28021 PROTO=TCP SPT=58314 DPT=84 WINDOW=1024 RES=0x00 SYN URGP=0
2020-06-04 21:46:33
46.38.145.252 attackspambots
Jun  4 15:16:49 srv01 postfix/smtpd\[10064\]: warning: unknown\[46.38.145.252\]: SASL LOGIN authentication failed: VXNlcm5hbWU6
Jun  4 15:17:25 srv01 postfix/smtpd\[10064\]: warning: unknown\[46.38.145.252\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  4 15:18:05 srv01 postfix/smtpd\[10064\]: warning: unknown\[46.38.145.252\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  4 15:18:21 srv01 postfix/smtpd\[11215\]: warning: unknown\[46.38.145.252\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun  4 15:18:25 srv01 postfix/smtpd\[10064\]: warning: unknown\[46.38.145.252\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-06-04 21:22:16
191.232.191.253 attackspam
0,81-10/02 [bc00/m01] PostRequest-Spammer scoring: berlin
2020-06-04 21:46:18
182.61.185.49 attack
Jun  2 06:18:48 v11 sshd[22216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.185.49  user=r.r
Jun  2 06:18:50 v11 sshd[22216]: Failed password for r.r from 182.61.185.49 port 47882 ssh2
Jun  2 06:18:50 v11 sshd[22216]: Received disconnect from 182.61.185.49 port 47882:11: Bye Bye [preauth]
Jun  2 06:18:50 v11 sshd[22216]: Disconnected from 182.61.185.49 port 47882 [preauth]
Jun  2 06:26:39 v11 sshd[22967]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.185.49  user=r.r
Jun  2 06:26:41 v11 sshd[22967]: Failed password for r.r from 182.61.185.49 port 39194 ssh2
Jun  2 06:26:41 v11 sshd[22967]: Received disconnect from 182.61.185.49 port 39194:11: Bye Bye [preauth]
Jun  2 06:26:41 v11 sshd[22967]: Disconnected from 182.61.185.49 port 39194 [preauth]
Jun  2 06:29:10 v11 sshd[23074]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.........
-------------------------------
2020-06-04 21:31:33
202.47.116.107 attackbotsspam
Jun  4 14:36:54 piServer sshd[2217]: Failed password for root from 202.47.116.107 port 36364 ssh2
Jun  4 14:39:29 piServer sshd[2473]: Failed password for root from 202.47.116.107 port 43028 ssh2
...
2020-06-04 21:53:39

Recently Reported IPs

213.171.213.32 252.11.150.236 150.86.15.84 169.197.8.234
172.217.28.136 49.187.72.133 199.177.172.37 52.229.39.216
188.94.210.64 99.152.192.161 90.142.191.127 54.8.215.82
71.109.68.34 17.36.236.154 233.5.33.219 213.129.248.243
191.40.231.50 178.63.81.53 172.189.103.151 33.103.75.41