Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: HLNode

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.148.41.23 attackbotsspam
Automatic report - CMS Brute-Force Attack
2020-04-27 21:14:37
104.148.41.11 attack
Automatic report - CMS Brute-Force Attack
2020-04-27 21:13:56
104.148.41.102 attackbots
jannisjulius.de 104.148.41.102 [25/Apr/2020:08:39:54 +0200] "POST /wp-login.php HTTP/1.1" 200 11917 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:69.0) Gecko/20100101 Firefox/69.0"
jannisjulius.de 104.148.41.102 [25/Apr/2020:08:39:55 +0200] "POST /wp-login.php HTTP/1.1" 200 12304 "-" "Mozilla/5.0 (Windows NT 10.0; Win64; x64; rv:69.0) Gecko/20100101 Firefox/69.0"
2020-04-25 19:56:34
104.148.41.63 attackbotsspam
Return-Path: 
Delivered-To: hide@mx1.tees.ne.jp
Received: (qmail 31403 invoked
 by uid 0);
 15 Apr 2020 12:57:53 +0900
Received: from unknown (HELO rcvgw11.tees.ne.jp) (202.216.138.25)
 by mdl.tees.ne.jp
 with SMTP;
 15 Apr 2020 12:57:53 +0900
Received: from smtp.work (unknown [104.148.41.63])
 by rcvgw11.tees.ne.jp (Postfix)
 with ESMTP id 7DBD520C36 for ;
 Wed, 15 Apr 2020 12:57:53 +0900 (JST)
Subject: [Norton AntiSpam]コロナウイルス撲滅セール
From: info@q04.402smtp.work
To: hide@mx1.tees.ne.jp
Message-ID: 20200415125643
Content-Type: text/plain; charset="SHIFT_JIS"
Content-Transfer-Encoding: 7bit
MIME-Version: 1.0
X-Brightmail-Tracker: AAAABjVkWnA1ZDecGo+sLDRHjzs0R6FLNEkVcA==
2020-04-16 03:18:46
104.148.41.11 attackbots
[Wed Jan 08 21:12:46.700267 2020] [access_compat:error] [pid 12566] [client 104.148.41.11:44720] AH01797: client denied by server configuration: /var/www/html/josh/wp-login.php
...
2020-03-04 01:01:00
104.148.41.168 attack
[Thu Jan 09 01:57:44.771502 2020] [access_compat:error] [pid 24095] [client 104.148.41.168:40576] AH01797: client denied by server configuration: /var/www/html/luke/wp-login.php
...
2020-03-04 00:50:53
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.148.41.26
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52886
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.148.41.26.			IN	A

;; AUTHORITY SECTION:
.			566	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019110602 1800 900 604800 86400

;; Query time: 109 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 07 05:36:57 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 26.41.148.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 26.41.148.104.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
191.240.89.232 attack
SASL PLAIN auth failed: ruser=...
2020-07-17 06:49:26
187.109.46.47 attackbots
SASL PLAIN auth failed: ruser=...
2020-07-17 06:55:11
93.99.4.38 attackbots
SASL PLAIN auth failed: ruser=...
2020-07-17 06:37:07
177.154.237.142 attackspambots
SASL PLAIN auth failed: ruser=...
2020-07-17 07:07:44
178.20.140.84 attack
SASL PLAIN auth failed: ruser=...
2020-07-17 07:04:05
188.92.213.90 attackbotsspam
SASL PLAIN auth failed: ruser=...
2020-07-17 06:54:11
200.66.115.40 attackbots
SASL PLAIN auth failed: ruser=...
2020-07-17 06:48:40
196.0.119.126 attackspambots
SASL PLAIN auth failed: ruser=...
2020-07-17 06:49:10
191.53.236.144 attack
SASL PLAIN auth failed: ruser=...
2020-07-17 06:51:03
190.103.220.84 attackspambots
SASL PLAIN auth failed: ruser=...
2020-07-17 06:53:22
187.95.49.1 attackspambots
SASL PLAIN auth failed: ruser=...
2020-07-17 06:55:57
181.174.144.13 attackbotsspam
SASL PLAIN auth failed: ruser=...
2020-07-17 07:02:06
177.93.97.81 attackbots
SASL PLAIN auth failed: ruser=...
2020-07-17 07:04:30
185.82.139.63 attackbotsspam
SASL PLAIN auth failed: ruser=...
2020-07-17 07:00:28
103.25.134.158 attack
SASL PLAIN auth failed: ruser=...
2020-07-17 07:14:53

Recently Reported IPs

125.214.56.150 213.193.30.13 72.69.72.10 213.16.81.182
190.201.182.127 183.83.67.15 182.202.231.218 125.115.87.113
192.158.224.0 167.172.37.150 222.217.21.64 210.210.130.139
118.68.101.135 183.83.91.160 67.21.32.80 46.107.230.156
210.195.224.155 200.245.153.150 93.34.159.7 210.195.179.84