Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Thailand

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
1.2.148.66 attack
Unauthorized connection attempt from IP address 1.2.148.66 on Port 445(SMB)
2020-01-03 18:12:18
1.2.148.56 attack
23/tcp
[2019-11-13]1pkt
2019-11-13 21:38:14
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 1.2.148.58
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;1.2.148.58.			IN	A

;; AUTHORITY SECTION:
.			203	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022400 1800 900 604800 86400

;; Query time: 26 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 24 18:19:44 CST 2022
;; MSG SIZE  rcvd: 103
Host info
58.148.2.1.in-addr.arpa domain name pointer node-3zu.pool-1-2.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
58.148.2.1.in-addr.arpa	name = node-3zu.pool-1-2.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.51.214.44 attack
Sep 28 00:40:15 minden010 sshd[9263]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.214.44
Sep 28 00:40:17 minden010 sshd[9263]: Failed password for invalid user test2 from 122.51.214.44 port 37758 ssh2
Sep 28 00:45:47 minden010 sshd[11154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.214.44
...
2020-09-28 07:45:39
140.143.153.79 attack
Sep 28 00:58:46 ns392434 sshd[16103]: Invalid user admin2 from 140.143.153.79 port 34482
Sep 28 00:58:46 ns392434 sshd[16103]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.153.79
Sep 28 00:58:46 ns392434 sshd[16103]: Invalid user admin2 from 140.143.153.79 port 34482
Sep 28 00:58:49 ns392434 sshd[16103]: Failed password for invalid user admin2 from 140.143.153.79 port 34482 ssh2
Sep 28 01:08:51 ns392434 sshd[16332]: Invalid user ubuntu from 140.143.153.79 port 54808
Sep 28 01:08:51 ns392434 sshd[16332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.153.79
Sep 28 01:08:51 ns392434 sshd[16332]: Invalid user ubuntu from 140.143.153.79 port 54808
Sep 28 01:08:53 ns392434 sshd[16332]: Failed password for invalid user ubuntu from 140.143.153.79 port 54808 ssh2
Sep 28 01:20:19 ns392434 sshd[16929]: Invalid user docker from 140.143.153.79 port 38088
2020-09-28 07:38:19
93.168.56.237 spambotsattackproxynormal
‏SA-STC-20080319
2020-09-28 09:52:19
101.227.82.60 attack
3x Failed Password
2020-09-28 07:55:43
118.24.208.24 attack
Sep 27 14:25:21 askasleikir sshd[18285]: Failed password for root from 118.24.208.24 port 38960 ssh2
2020-09-28 07:46:08
93.168.56.237 spambotsattackproxynormal
‏SA-STC-20080319
2020-09-28 09:52:07
159.65.149.139 attack
invalid user kai from 159.65.149.139 port 35422 ssh2
2020-09-28 07:54:15
51.38.179.113 attack
invalid user postgres from 51.38.179.113 port 53178 ssh2
2020-09-28 07:34:58
114.236.10.251 attackspam
Trying ports that it shouldn't be.
2020-09-28 07:49:38
110.49.70.249 attackspam
Sep 28 04:48:51 mout sshd[29632]: Invalid user user from 110.49.70.249 port 13043
Sep 28 04:48:53 mout sshd[29632]: Failed password for invalid user user from 110.49.70.249 port 13043 ssh2
Sep 28 04:48:55 mout sshd[29632]: Disconnected from invalid user user 110.49.70.249 port 13043 [preauth]
2020-09-28 12:04:31
111.230.73.133 attackbots
Invalid user abc from 111.230.73.133 port 49240
2020-09-28 07:34:43
125.227.131.15 attackbotsspam
1601171691 - 09/27/2020 03:54:51 Host: 125.227.131.15/125.227.131.15 Port: 23 TCP Blocked
...
2020-09-28 07:42:56
122.3.87.69 attack
Unauthorized connection attempt from IP address 122.3.87.69 on Port 445(SMB)
2020-09-28 07:35:11
51.91.56.133 attack
Sep 27 06:13:41 *hidden* sshd[31896]: Failed password for invalid user node from 51.91.56.133 port 41322 ssh2 Sep 27 06:18:57 *hidden* sshd[548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.56.133 user=root Sep 27 06:18:58 *hidden* sshd[548]: Failed password for *hidden* from 51.91.56.133 port 56650 ssh2
2020-09-28 12:07:24
150.109.236.199 attack
[Wed Aug 05 15:19:11 2020] - DDoS Attack From IP: 150.109.236.199 Port: 58059
2020-09-28 07:44:14

Recently Reported IPs

45.81.18.199 1.2.149.1 1.2.149.104 1.2.149.108
1.2.149.125 1.2.149.136 1.2.149.143 1.2.149.164
55.199.36.44 147.186.57.7 1.2.149.169 1.2.149.179
63.53.134.157 1.2.149.220 1.2.149.234 1.2.150.104
1.2.150.129 1.2.150.17 168.66.44.158 1.2.150.173