Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 221.253.120.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43713
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;221.253.120.148.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012300 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 01:30:35 CST 2025
;; MSG SIZE  rcvd: 108
Host info
148.120.253.221.in-addr.arpa domain name pointer 221x253x120x148.ap221.ftth.ucom.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.120.253.221.in-addr.arpa	name = 221x253x120x148.ap221.ftth.ucom.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
196.37.111.217 attack
Exploited Host.
2020-07-26 00:36:03
87.251.74.18 attack
Unauthorized connection attempt from IP address 87.251.74.18 on Port 3389(RDP)
2020-07-26 00:40:57
112.133.236.17 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-26 00:24:57
193.27.229.15 attack
Brute force RDP 3389.
2020-07-26 00:38:31
116.96.76.119 attackspambots
Unauthorized connection attempt from IP address 116.96.76.119 on Port 445(SMB)
2020-07-26 00:40:29
140.143.208.92 attackspambots
Exploited Host.
2020-07-26 00:53:12
140.143.249.234 attackbotsspam
Exploited Host.
2020-07-26 00:34:01
210.68.161.17 attackbotsspam
Unauthorized connection attempt from IP address 210.68.161.17 on Port 445(SMB)
2020-07-26 00:35:43
200.91.216.210 attackbotsspam
Unauthorized connection attempt from IP address 200.91.216.210 on Port 445(SMB)
2020-07-26 00:48:55
103.217.255.42 attackspam
Jul 25 16:13:19 game-panel sshd[12258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.217.255.42
Jul 25 16:13:21 game-panel sshd[12258]: Failed password for invalid user seng from 103.217.255.42 port 43594 ssh2
Jul 25 16:20:35 game-panel sshd[12617]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.217.255.42
2020-07-26 00:32:35
193.169.253.48 attack
Rude login attack (60 tries in 1d)
2020-07-26 00:19:14
140.143.244.31 attackbotsspam
Exploited Host.
2020-07-26 00:37:13
193.112.143.141 attackspam
2020-07-25T19:20:39.254763lavrinenko.info sshd[579]: Invalid user rancher from 193.112.143.141 port 45308
2020-07-25T19:20:39.260902lavrinenko.info sshd[579]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.143.141
2020-07-25T19:20:39.254763lavrinenko.info sshd[579]: Invalid user rancher from 193.112.143.141 port 45308
2020-07-25T19:20:41.137124lavrinenko.info sshd[579]: Failed password for invalid user rancher from 193.112.143.141 port 45308 ssh2
2020-07-25T19:25:17.710698lavrinenko.info sshd[783]: Invalid user ajmal from 193.112.143.141 port 38344
...
2020-07-26 00:36:24
72.11.135.222 attackbotsspam
SMTP
2020-07-26 00:17:33
113.175.221.134 attackbots
Unauthorized connection attempt from IP address 113.175.221.134 on Port 445(SMB)
2020-07-26 00:24:28

Recently Reported IPs

138.168.74.142 197.179.38.208 118.136.161.254 34.31.137.7
29.128.30.153 35.254.183.96 56.25.244.0 44.126.101.232
223.125.189.64 93.5.78.214 142.52.225.186 212.124.184.246
233.9.144.199 41.106.94.248 96.195.220.115 120.206.136.31
179.145.214.154 64.25.114.238 247.251.87.220 31.245.197.161