Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: HLNode

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.148.41.23 attackbotsspam
Automatic report - CMS Brute-Force Attack
2020-04-27 21:14:37
104.148.41.11 attack
Automatic report - CMS Brute-Force Attack
2020-04-27 21:13:56
104.148.41.102 attackbots
jannisjulius.de 104.148.41.102 [25/Apr/2020:08:39:54 +0200] "POST /wp-login.php HTTP/1.1" 200 11917 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:69.0) Gecko/20100101 Firefox/69.0"
jannisjulius.de 104.148.41.102 [25/Apr/2020:08:39:55 +0200] "POST /wp-login.php HTTP/1.1" 200 12304 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:69.0) Gecko/20100101 Firefox/69.0"
2020-04-25 19:56:34
104.148.41.63 attackbotsspam
Return-Path: 
Delivered-To: hide@mx1.tees.ne.jp
Received: (qmail 31403 invoked
 by uid 0);
 15 Apr 2020 12:57:53 +0900
Received: from unknown (HELO rcvgw11.tees.ne.jp) (202.216.138.25)
 by mdl.tees.ne.jp
 with SMTP;
 15 Apr 2020 12:57:53 +0900
Received: from smtp.work (unknown [104.148.41.63])
 by rcvgw11.tees.ne.jp (Postfix)
 with ESMTP id 7DBD520C36 for ;
 Wed, 15 Apr 2020 12:57:53 +0900 (JST)
Subject: [Norton AntiSpam]コロナウイルス撲滅セール
From: info@q04.402smtp.work
To: hide@mx1.tees.ne.jp
Message-ID: 20200415125643
Content-Type: text/plain; charset="SHIFT_JIS"
Content-Transfer-Encoding: 7bit
MIME-Version: 1.0
X-Brightmail-Tracker: AAAABjVkWnA1ZDecGo+sLDRHjzs0R6FLNEkVcA==
2020-04-16 03:18:46
104.148.41.11 attackbots
[Wed Jan 08 21:12:46.700267 2020] [access_compat:error] [pid 12566] [client 104.148.41.11:44720] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2020-03-04 01:01:00
104.148.41.168 attack
[Thu Jan 09 01:57:44.771502 2020] [access_compat:error] [pid 24095] [client 104.148.41.168:40576] AH01797: client denied by server configuration: /var/www/html/luke/wp-login.php
...
2020-03-04 00:50:53
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.148.41.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.148.41.26.			IN	A

;; AUTHORITY SECTION:
.			566	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110602 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 07 05:36:57 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 26.41.148.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 26.41.148.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
113.231.191.139 attackspam
5500/tcp
[2019-06-30]1pkt
2019-06-30 12:49:39
73.8.91.33 attackbots
Jun 30 05:46:09 nextcloud sshd\[30384\]: Invalid user president from 73.8.91.33
Jun 30 05:46:09 nextcloud sshd\[30384\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=73.8.91.33
Jun 30 05:46:11 nextcloud sshd\[30384\]: Failed password for invalid user president from 73.8.91.33 port 47182 ssh2
...
2019-06-30 12:45:39
182.68.80.120 attack
Unauthorised access (Jun 30) SRC=182.68.80.120 LEN=52 TTL=119 ID=5393 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-30 12:39:36
119.93.145.214 attackbotsspam
445/tcp
[2019-06-30]1pkt
2019-06-30 12:22:37
104.199.137.183 attack
23/tcp
[2019-06-30]1pkt
2019-06-30 12:24:11
202.130.34.106 attackspambots
20 attempts against mh-ssh on train.magehost.pro
2019-06-30 12:23:34
104.131.39.165 attack
GET: /admin/
2019-06-30 12:35:31
180.232.96.162 attackspam
30.06.2019 03:47:03 SSH access blocked by firewall
2019-06-30 12:16:20
46.101.17.215 attack
Triggered by Fail2Ban
2019-06-30 12:38:10
118.25.221.166 attackbots
2019-06-30T05:52:17.171969scmdmz1 sshd\[30829\]: Invalid user qhsupport from 118.25.221.166 port 34842
2019-06-30T05:52:17.176259scmdmz1 sshd\[30829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.221.166
2019-06-30T05:52:19.315001scmdmz1 sshd\[30829\]: Failed password for invalid user qhsupport from 118.25.221.166 port 34842 ssh2
...
2019-06-30 12:14:13
176.31.250.160 attack
Jun 30 05:03:43 localhost sshd\[31224\]: Invalid user minecraft from 176.31.250.160 port 43676
Jun 30 05:03:43 localhost sshd\[31224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.31.250.160
...
2019-06-30 12:19:02
113.116.56.14 attackbotsspam
23/tcp
[2019-06-30]1pkt
2019-06-30 12:48:45
74.63.232.2 attack
Jun 30 05:46:48 ArkNodeAT sshd\[27322\]: Invalid user admin from 74.63.232.2
Jun 30 05:46:48 ArkNodeAT sshd\[27322\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.63.232.2
Jun 30 05:46:50 ArkNodeAT sshd\[27322\]: Failed password for invalid user admin from 74.63.232.2 port 47110 ssh2
2019-06-30 12:25:18
1.174.1.62 attackspam
37215/tcp
[2019-06-30]1pkt
2019-06-30 12:25:54
153.251.236.161 attackbots
3389/tcp 3389/tcp 3389/tcp
[2019-06-30]3pkt
2019-06-30 12:38:40

Recently Reported IPs

125.214.56.150 213.193.30.13 72.69.72.10 213.16.81.182
190.201.182.127 183.83.67.15 182.202.231.218 125.115.87.113
192.158.224.0 167.172.37.150 222.217.21.64 210.210.130.139
118.68.101.135 183.83.91.160 67.21.32.80 46.107.230.156
210.195.224.155 200.245.153.150 93.34.159.7 210.195.179.84