Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Bengaluru

Region: Karnataka

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.148.15.38 attackbots
Automatic report - Banned IP Access
2020-09-14 22:00:14
103.148.15.38 attackbots
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-14 13:54:05
103.148.15.38 attackspambots
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-14 05:51:42
103.148.194.2 attackspam
20/9/5@17:28:19: FAIL: Alarm-Network address from=103.148.194.2
...
2020-09-07 03:06:42
103.148.194.2 attackbotsspam
20/9/5@17:28:19: FAIL: Alarm-Network address from=103.148.194.2
...
2020-09-06 18:33:00
103.148.15.38 attackbotsspam
GET /wp-login.php HTTP/1.1
2020-08-28 15:38:16
103.148.164.161 attackspambots
Port Scan
...
2020-08-26 17:41:05
103.148.139.62 attack
Email rejected due to spam filtering
2020-08-01 03:41:26
103.148.195.14 attack
Port probing on unauthorized port 23
2020-07-31 05:23:09
103.148.138.124 attack
failed_logins
2020-06-03 22:57:13
103.148.149.22 attackbots
Invalid user admin from 103.148.149.22 port 62644
2020-05-23 17:03:07
103.148.150.4 attack
RDP Brute-Force (Grieskirchen RZ2)
2020-05-16 00:01:54
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.148.1.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7422
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.148.1.4.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021121701 1800 900 604800 86400

;; Query time: 113 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 18 01:37:00 CST 2021
;; MSG SIZE  rcvd: 104
Host info
Host 4.1.148.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 4.1.148.103.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
1.53.4.26 attack
23/tcp
[2019-10-28]1pkt
2019-10-29 03:12:40
125.212.201.7 attack
Oct 28 19:07:08 server sshd\[18088\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.201.7  user=root
Oct 28 19:07:10 server sshd\[18088\]: Failed password for root from 125.212.201.7 port 33740 ssh2
Oct 28 19:18:09 server sshd\[20574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.201.7  user=root
Oct 28 19:18:11 server sshd\[20574\]: Failed password for root from 125.212.201.7 port 37583 ssh2
Oct 28 19:22:46 server sshd\[21663\]: Invalid user prueba from 125.212.201.7
Oct 28 19:22:46 server sshd\[21663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.212.201.7 
...
2019-10-29 03:11:31
81.47.128.178 attackbotsspam
Invalid user newadmin from 81.47.128.178 port 54290
2019-10-29 02:54:31
88.247.49.78 attackbotsspam
445/tcp
[2019-10-28]1pkt
2019-10-29 02:57:56
42.84.204.177 attackbots
23/tcp
[2019-10-28]1pkt
2019-10-29 03:02:40
54.36.21.217 attackbotsspam
Oct 28 11:44:55 mxgate1 postfix/postscreen[21566]: CONNECT from [54.36.21.217]:60937 to [176.31.12.44]:25
Oct 28 11:44:55 mxgate1 postfix/dnsblog[21579]: addr 54.36.21.217 listed by domain zen.spamhaus.org as 127.0.0.3
Oct 28 11:44:55 mxgate1 postfix/dnsblog[21579]: addr 54.36.21.217 listed by domain zen.spamhaus.org as 127.0.0.4
Oct 28 11:44:55 mxgate1 postfix/dnsblog[21579]: addr 54.36.21.217 listed by domain zen.spamhaus.org as 127.0.0.2
Oct 28 11:44:55 mxgate1 postfix/dnsblog[21580]: addr 54.36.21.217 listed by domain cbl.abuseat.org as 127.0.0.2
Oct 28 11:45:01 mxgate1 postfix/postscreen[21566]: DNSBL rank 3 for [54.36.21.217]:60937
Oct 28 11:45:01 mxgate1 postfix/tlsproxy[21839]: CONNECT from [54.36.21.217]:60937
Oct x@x
Oct 28 11:45:01 mxgate1 postfix/postscreen[21566]: DISCONNECT [54.36.21.217]:60937
Oct 28 11:45:01 mxgate1 postfix/tlsproxy[21839]: DISCONNECT [54.36.21.217]:60937


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=54.36.21.217
2019-10-29 02:59:51
45.136.109.9 attackspam
Connection by 45.136.109.9 on port: 43389 got caught by honeypot at 10/28/2019 4:47:55 AM
2019-10-29 03:00:16
118.26.23.225 attack
SSH Bruteforce attack
2019-10-29 02:39:46
109.252.0.63 attackspambots
Chat Spam
2019-10-29 03:12:55
36.224.81.102 attackbotsspam
445/tcp
[2019-10-28]1pkt
2019-10-29 02:43:26
180.241.126.192 attackbots
23/tcp
[2019-10-28]1pkt
2019-10-29 02:52:53
222.186.175.147 attackspambots
2019-10-28T19:46:43.007171scmdmz1 sshd\[14952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.147  user=root
2019-10-28T19:46:44.907195scmdmz1 sshd\[14952\]: Failed password for root from 222.186.175.147 port 59384 ssh2
2019-10-28T19:46:48.730163scmdmz1 sshd\[14952\]: Failed password for root from 222.186.175.147 port 59384 ssh2
...
2019-10-29 02:50:52
41.234.71.134 attack
Brute force attempt
2019-10-29 02:42:59
95.9.97.75 attack
445/tcp
[2019-10-28]1pkt
2019-10-29 03:06:52
68.145.82.154 attackspam
8080/tcp
[2019-10-28]1pkt
2019-10-29 02:38:39

Recently Reported IPs

142.250.214.105 2804:18:8cd:4eec:6b12:d092:d158:fe57 45.180.80.113 2804:18:10c2:bd24:491c:bb14:1f8f:25d
142.251.129.234 95.102.49.61 172.24.240.1 111.190.150.168
186.236.100.58 186.138.171.151 186.138.171.124 124.217.116.198
91.149.225.211 95.82.118.80 233.166.193.90 106.79.202.106
195.154.171.171 78.80.112.204 85.93.59.110 85.26.234.99