Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 240.148.22.133
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;240.148.22.133.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 20:50:17 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 133.22.148.240.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 133.22.148.240.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
163.172.204.185 attack
Nov 24 18:55:45 kapalua sshd\[25974\]: Invalid user bernd from 163.172.204.185
Nov 24 18:55:45 kapalua sshd\[25974\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185
Nov 24 18:55:47 kapalua sshd\[25974\]: Failed password for invalid user bernd from 163.172.204.185 port 48850 ssh2
Nov 24 18:59:45 kapalua sshd\[26315\]: Invalid user moebes from 163.172.204.185
Nov 24 18:59:45 kapalua sshd\[26315\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.204.185
2019-11-25 13:02:45
34.95.212.142 attackspam
34.95.212.142 was recorded 5 times by 1 hosts attempting to connect to the following ports: 23. Incident counter (4h, 24h, all-time): 5, 5, 5
2019-11-25 09:10:44
106.51.230.186 attackspambots
Nov 24 14:33:43 tdfoods sshd\[2470\]: Invalid user arons from 106.51.230.186
Nov 24 14:33:43 tdfoods sshd\[2470\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.230.186
Nov 24 14:33:45 tdfoods sshd\[2470\]: Failed password for invalid user arons from 106.51.230.186 port 54822 ssh2
Nov 24 14:41:56 tdfoods sshd\[3222\]: Invalid user magalie from 106.51.230.186
Nov 24 14:41:56 tdfoods sshd\[3222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.51.230.186
2019-11-25 09:05:41
195.9.20.102 attackspambots
Unauthorised access (Nov 25) SRC=195.9.20.102 LEN=52 TTL=112 ID=18210 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-25 09:11:46
77.247.109.42 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-25 09:22:32
185.176.27.254 attack
11/24/2019-19:34:00.965992 185.176.27.254 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-25 09:11:06
106.45.1.56 attack
1574636145 - 11/24/2019 23:55:45 Host: 106.45.1.56/106.45.1.56 Port: 6001 TCP Blocked
2019-11-25 09:07:57
200.195.172.114 attackbotsspam
Nov 25 01:48:39 OPSO sshd\[30583\]: Invalid user home from 200.195.172.114 port 62179
Nov 25 01:48:39 OPSO sshd\[30583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.195.172.114
Nov 25 01:48:41 OPSO sshd\[30583\]: Failed password for invalid user home from 200.195.172.114 port 62179 ssh2
Nov 25 01:55:25 OPSO sshd\[32363\]: Invalid user takehiro from 200.195.172.114 port 5908
Nov 25 01:55:25 OPSO sshd\[32363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.195.172.114
2019-11-25 09:23:26
45.236.244.130 attack
Nov 25 01:28:56 vps647732 sshd[10754]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.236.244.130
Nov 25 01:28:59 vps647732 sshd[10754]: Failed password for invalid user server from 45.236.244.130 port 43552 ssh2
...
2019-11-25 09:21:53
201.238.239.151 attackbotsspam
Nov 24 14:52:24 web1 sshd\[21022\]: Invalid user morgan from 201.238.239.151
Nov 24 14:52:24 web1 sshd\[21022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.238.239.151
Nov 24 14:52:27 web1 sshd\[21022\]: Failed password for invalid user morgan from 201.238.239.151 port 38565 ssh2
Nov 24 14:56:53 web1 sshd\[21421\]: Invalid user dovecot from 201.238.239.151
Nov 24 14:56:53 web1 sshd\[21421\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.238.239.151
2019-11-25 09:14:55
139.59.59.154 attack
Nov 25 04:59:07 gw1 sshd[29068]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.59.154
Nov 25 04:59:08 gw1 sshd[29068]: Failed password for invalid user stodieck from 139.59.59.154 port 46688 ssh2
...
2019-11-25 09:15:24
158.69.137.130 attackbots
Nov 25 06:53:37 taivassalofi sshd[197045]: Failed password for root from 158.69.137.130 port 53774 ssh2
Nov 25 06:59:45 taivassalofi sshd[197147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.137.130
...
2019-11-25 13:03:00
103.81.87.204 attack
Invalid user temp1 from 103.81.87.204 port 53466
2019-11-25 09:31:08
103.126.100.67 attack
Nov 25 02:04:13 MK-Soft-Root1 sshd[16026]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.126.100.67 
Nov 25 02:04:15 MK-Soft-Root1 sshd[16026]: Failed password for invalid user krief from 103.126.100.67 port 34704 ssh2
...
2019-11-25 09:14:04
59.152.196.154 attackspambots
Nov 25 01:02:31 vpn01 sshd[30966]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=59.152.196.154
Nov 25 01:02:33 vpn01 sshd[30966]: Failed password for invalid user server from 59.152.196.154 port 56605 ssh2
...
2019-11-25 09:02:00

Recently Reported IPs

139.8.18.8 77.219.193.208 90.126.165.212 7.215.18.74
217.57.195.103 7.107.137.133 251.38.249.44 204.163.51.159
2.245.147.112 27.66.41.130 186.225.171.52 99.246.185.66
127.6.181.239 42.236.217.51 185.152.179.208 220.30.224.51
240.155.194.123 159.77.187.3 205.173.213.1 125.10.149.190