Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: Global Frag Networks

Hostname: unknown

Organization: unknown

Usage Type: Data Center/Web Hosting/Transit

Comments:
Type Details Datetime
attackspam
Nov 25 07:13:40 mxgate1 postfix/postscreen[31676]: CONNECT from [104.148.64.136]:60602 to [176.31.12.44]:25
Nov 25 07:13:40 mxgate1 postfix/dnsblog[31678]: addr 104.148.64.136 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 25 07:13:40 mxgate1 postfix/dnsblog[31680]: addr 104.148.64.136 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 25 07:13:46 mxgate1 postfix/postscreen[31676]: DNSBL rank 3 for [104.148.64.136]:60602
Nov x@x
Nov 25 07:13:47 mxgate1 postfix/postscreen[31676]: DISCONNECT [104.148.64.136]:60602


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.148.64.136
2019-11-25 19:58:48
Comments on same subnet:
IP Type Details Datetime
104.148.64.185 attackbotsspam
Jan  7 20:47:46 mxgate1 postfix/postscreen[8982]: CONNECT from [104.148.64.185]:51528 to [176.31.12.44]:25
Jan  7 20:47:46 mxgate1 postfix/dnsblog[9025]: addr 104.148.64.185 listed by domain zen.spamhaus.org as 127.0.0.3
Jan  7 20:47:47 mxgate1 postfix/dnsblog[9026]: addr 104.148.64.185 listed by domain b.barracudacentral.org as 127.0.0.2
Jan  7 20:47:52 mxgate1 postfix/postscreen[8982]: DNSBL rank 3 for [104.148.64.185]:51528
Jan x@x
Jan  7 20:47:53 mxgate1 postfix/postscreen[8982]: DISCONNECT [104.148.64.185]:51528


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.148.64.185
2020-01-08 17:53:27
104.148.64.174 attackspam
10.10.2019 13:58:30 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-10-10 21:30:17
104.148.64.135 attackspam
Jul 30 04:21:07 mxgate1 postfix/postscreen[8687]: CONNECT from [104.148.64.135]:60088 to [176.31.12.44]:25
Jul 30 04:21:07 mxgate1 postfix/dnsblog[8958]: addr 104.148.64.135 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 30 04:21:13 mxgate1 postfix/postscreen[8687]: DNSBL rank 2 for [104.148.64.135]:60088
Jul x@x
Jul 30 04:21:14 mxgate1 postfix/postscreen[8687]: DISCONNECT [104.148.64.135]:60088


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.148.64.135
2019-07-30 13:41:40
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.148.64.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 4864
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.148.64.136.			IN	A

;; AUTHORITY SECTION:
.			385	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112500 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 25 19:58:42 CST 2019
;; MSG SIZE  rcvd: 118
Host info
136.64.148.104.in-addr.arpa domain name pointer mail.meshusdn.world.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.64.148.104.in-addr.arpa	name = mail.meshusdn.world.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
88.206.36.64 attackbots
Unauthorized connection attempt from IP address 88.206.36.64 on Port 445(SMB)
2020-09-24 15:42:58
173.44.175.45 attack
173.44.175.45 has been banned for [spam]
...
2020-09-24 15:26:34
13.82.219.14 attackbots
$f2bV_matches
2020-09-24 15:28:46
112.85.42.238 attackspam
Sep 24 09:32:21 abendstille sshd\[7364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
Sep 24 09:32:23 abendstille sshd\[7364\]: Failed password for root from 112.85.42.238 port 51635 ssh2
Sep 24 09:32:25 abendstille sshd\[7364\]: Failed password for root from 112.85.42.238 port 51635 ssh2
Sep 24 09:32:28 abendstille sshd\[7364\]: Failed password for root from 112.85.42.238 port 51635 ssh2
Sep 24 09:33:13 abendstille sshd\[7834\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.238  user=root
...
2020-09-24 15:44:22
168.61.66.7 attack
<6 unauthorized SSH connections
2020-09-24 15:41:56
49.68.147.49 attack
$f2bV_matches
2020-09-24 15:21:31
98.143.145.30 attackbotsspam
Automatic report - Banned IP Access
2020-09-24 15:46:19
211.233.81.230 attackbotsspam
(sshd) Failed SSH login from 211.233.81.230 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 24 01:04:29 idl1-dfw sshd[1065016]: Invalid user ubuntu from 211.233.81.230 port 34003
Sep 24 01:04:31 idl1-dfw sshd[1065016]: Failed password for invalid user ubuntu from 211.233.81.230 port 34003 ssh2
Sep 24 01:06:12 idl1-dfw sshd[1066135]: Invalid user bkp from 211.233.81.230 port 41226
Sep 24 01:06:14 idl1-dfw sshd[1066135]: Failed password for invalid user bkp from 211.233.81.230 port 41226 ssh2
Sep 24 01:07:23 idl1-dfw sshd[1067396]: Invalid user z from 211.233.81.230 port 45541
2020-09-24 15:08:00
121.8.154.106 attackspambots
Unauthorized connection attempt from IP address 121.8.154.106 on Port 445(SMB)
2020-09-24 15:30:05
173.25.192.192 attack
(sshd) Failed SSH login from 173.25.192.192 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 23 13:03:00 server2 sshd[9353]: Invalid user admin from 173.25.192.192
Sep 23 13:03:02 server2 sshd[9353]: Failed password for invalid user admin from 173.25.192.192 port 58111 ssh2
Sep 23 13:03:02 server2 sshd[9620]: Invalid user admin from 173.25.192.192
Sep 23 13:03:04 server2 sshd[9620]: Failed password for invalid user admin from 173.25.192.192 port 51629 ssh2
Sep 23 13:03:04 server2 sshd[9654]: Invalid user admin from 173.25.192.192
2020-09-24 15:12:55
115.99.231.192 attackbots
Listed on    zen-spamhaus also abuseat.org and dnsbl-sorbs   / proto=6  .  srcport=6584  .  dstport=23  .     (2885)
2020-09-24 15:18:08
196.52.43.127 attackbots
Port scan denied
2020-09-24 15:21:07
80.14.140.41 attack
Tried our host z.
2020-09-24 15:12:12
40.76.192.252 attackspam
<6 unauthorized SSH connections
2020-09-24 15:39:04
52.254.8.192 attackbots
Invalid user azureuser from 52.254.8.192 port 9843
2020-09-24 15:06:38

Recently Reported IPs

24.86.80.229 187.67.44.105 189.171.50.188 159.89.129.215
89.70.32.104 28.190.22.250 173.200.46.77 106.125.234.34
185.208.148.54 82.82.0.78 85.113.169.204 234.120.95.253
174.233.33.224 235.21.75.213 228.113.48.12 128.20.83.131
92.62.74.3 26.127.85.27 70.17.233.179 221.178.156.154