Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 0.164.53.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7086
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;0.164.53.148.			IN	A

;; AUTHORITY SECTION:
.			509	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022092501 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 26 06:07:11 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 148.53.164.0.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.53.164.0.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.84.111 attackspambots
no
2019-12-04 14:58:39
178.75.126.27 attackspam
" "
2019-12-04 14:15:48
218.8.157.44 attackbots
Automatic report - Port Scan Attack
2019-12-04 14:42:18
104.168.219.7 attack
Lines containing failures of 104.168.219.7
Dec  3 22:51:32 siirappi sshd[30288]: Invalid user vaughen from 104.168.219.7 port 46100
Dec  3 22:51:32 siirappi sshd[30288]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.219.7
Dec  3 22:51:34 siirappi sshd[30288]: Failed password for invalid user vaughen from 104.168.219.7 port 46100 ssh2
Dec  3 22:51:34 siirappi sshd[30288]: Received disconnect from 104.168.219.7 port 46100:11: Bye Bye [preauth]
Dec  3 22:51:34 siirappi sshd[30288]: Disconnected from 104.168.219.7 port 46100 [preauth]
Dec  3 23:00:45 siirappi sshd[30499]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.168.219.7  user=r.r
Dec  3 23:00:47 siirappi sshd[30499]: Failed password for r.r from 104.168.219.7 port 41140 ssh2
Dec  3 23:00:47 siirappi sshd[30499]: Received disconnect from 104.168.219.7 port 41140:11: Bye Bye [preauth]
Dec  3 23:00:47 siirappi sshd[30499]: Dis........
------------------------------
2019-12-04 15:03:20
222.186.15.246 attackspam
SSH bruteforce
2019-12-04 14:26:32
179.145.55.199 attack
Automatic report - Port Scan Attack
2019-12-04 14:55:13
42.247.22.66 attackspambots
Dec  4 05:56:31 hell sshd[25105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.247.22.66
Dec  4 05:56:33 hell sshd[25105]: Failed password for invalid user ferachoglou from 42.247.22.66 port 36650 ssh2
...
2019-12-04 14:23:22
176.31.162.82 attack
Dec  4 01:24:47 linuxvps sshd\[25476\]: Invalid user gint from 176.31.162.82
Dec  4 01:24:47 linuxvps sshd\[25476\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.162.82
Dec  4 01:24:49 linuxvps sshd\[25476\]: Failed password for invalid user gint from 176.31.162.82 port 43194 ssh2
Dec  4 01:30:07 linuxvps sshd\[28683\]: Invalid user smmsp from 176.31.162.82
Dec  4 01:30:07 linuxvps sshd\[28683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.162.82
2019-12-04 14:56:18
197.156.118.197 attack
TCP Port Scanning
2019-12-04 14:51:36
118.167.74.100 attack
Fail2Ban - FTP Abuse Attempt
2019-12-04 14:27:08
212.64.88.97 attackbots
2019-12-04T07:23:20.416890scmdmz1 sshd\[3614\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.64.88.97  user=root
2019-12-04T07:23:22.201568scmdmz1 sshd\[3614\]: Failed password for root from 212.64.88.97 port 49970 ssh2
2019-12-04T07:30:19.880810scmdmz1 sshd\[4377\]: Invalid user guest from 212.64.88.97 port 57456
...
2019-12-04 14:50:14
185.211.245.170 attackspam
Dec  4 07:19:24 srv01 postfix/smtpd\[25523\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  4 07:19:37 srv01 postfix/smtpd\[25523\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  4 07:25:59 srv01 postfix/smtpd\[10186\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  4 07:26:07 srv01 postfix/smtpd\[12570\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Dec  4 07:30:45 srv01 postfix/smtpd\[10186\]: warning: unknown\[185.211.245.170\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-12-04 14:40:56
118.24.71.83 attackbots
Dec  4 07:02:28 localhost sshd\[16136\]: Invalid user kacprowicz from 118.24.71.83 port 52210
Dec  4 07:02:28 localhost sshd\[16136\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.71.83
Dec  4 07:02:30 localhost sshd\[16136\]: Failed password for invalid user kacprowicz from 118.24.71.83 port 52210 ssh2
2019-12-04 14:22:16
218.92.0.131 attackspam
Dec  4 07:42:17 sd-53420 sshd\[1039\]: User root from 218.92.0.131 not allowed because none of user's groups are listed in AllowGroups
Dec  4 07:42:17 sd-53420 sshd\[1039\]: Failed none for invalid user root from 218.92.0.131 port 24681 ssh2
Dec  4 07:42:17 sd-53420 sshd\[1039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.131  user=root
Dec  4 07:42:19 sd-53420 sshd\[1039\]: Failed password for invalid user root from 218.92.0.131 port 24681 ssh2
Dec  4 07:42:22 sd-53420 sshd\[1039\]: Failed password for invalid user root from 218.92.0.131 port 24681 ssh2
...
2019-12-04 14:49:48
119.28.143.26 attack
Dec  4 07:18:29 h2177944 sshd\[24267\]: Invalid user florie from 119.28.143.26 port 50880
Dec  4 07:18:29 h2177944 sshd\[24267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.28.143.26
Dec  4 07:18:31 h2177944 sshd\[24267\]: Failed password for invalid user florie from 119.28.143.26 port 50880 ssh2
Dec  4 07:30:08 h2177944 sshd\[24854\]: Invalid user goba from 119.28.143.26 port 46380
...
2019-12-04 14:59:51

Recently Reported IPs

0.164.43.247 0.16.175.152 0.16.44.233 0.159.249.155
0.16.141.166 0.154.245.41 0.159.111.138 0.16.42.203
0.153.239.15 0.165.45.66 0.155.209.109 0.153.146.184
0.159.160.72 0.165.213.109 0.158.5.186 0.164.22.86
0.152.73.137 0.156.46.92 0.158.76.213 0.161.160.249