Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Global Frag Networks

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
104.148.64.185 attackbotsspam
Jan  7 20:47:46 mxgate1 postfix/postscreen[8982]: CONNECT from [104.148.64.185]:51528 to [176.31.12.44]:25
Jan  7 20:47:46 mxgate1 postfix/dnsblog[9025]: addr 104.148.64.185 listed by domain zen.spamhaus.org as 127.0.0.3
Jan  7 20:47:47 mxgate1 postfix/dnsblog[9026]: addr 104.148.64.185 listed by domain b.barracudacentral.org as 127.0.0.2
Jan  7 20:47:52 mxgate1 postfix/postscreen[8982]: DNSBL rank 3 for [104.148.64.185]:51528
Jan x@x
Jan  7 20:47:53 mxgate1 postfix/postscreen[8982]: DISCONNECT [104.148.64.185]:51528


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.148.64.185
2020-01-08 17:53:27
104.148.64.136 attackspam
Nov 25 07:13:40 mxgate1 postfix/postscreen[31676]: CONNECT from [104.148.64.136]:60602 to [176.31.12.44]:25
Nov 25 07:13:40 mxgate1 postfix/dnsblog[31678]: addr 104.148.64.136 listed by domain zen.spamhaus.org as 127.0.0.3
Nov 25 07:13:40 mxgate1 postfix/dnsblog[31680]: addr 104.148.64.136 listed by domain b.barracudacentral.org as 127.0.0.2
Nov 25 07:13:46 mxgate1 postfix/postscreen[31676]: DNSBL rank 3 for [104.148.64.136]:60602
Nov x@x
Nov 25 07:13:47 mxgate1 postfix/postscreen[31676]: DISCONNECT [104.148.64.136]:60602


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.148.64.136
2019-11-25 19:58:48
104.148.64.174 attackspam
10.10.2019 13:58:30 - Login Fail on hMailserver 
Detected by ELinOX-hMail-A2F
2019-10-10 21:30:17
104.148.64.135 attackspam
Jul 30 04:21:07 mxgate1 postfix/postscreen[8687]: CONNECT from [104.148.64.135]:60088 to [176.31.12.44]:25
Jul 30 04:21:07 mxgate1 postfix/dnsblog[8958]: addr 104.148.64.135 listed by domain zen.spamhaus.org as 127.0.0.3
Jul 30 04:21:13 mxgate1 postfix/postscreen[8687]: DNSBL rank 2 for [104.148.64.135]:60088
Jul x@x
Jul 30 04:21:14 mxgate1 postfix/postscreen[8687]: DISCONNECT [104.148.64.135]:60088


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=104.148.64.135
2019-07-30 13:41:40
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.148.64.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51883
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.148.64.203.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041102 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Fri Apr 12 12:05:39 +08 2019
;; MSG SIZE  rcvd: 118

Host info
Host 203.64.148.104.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 203.64.148.104.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
24.54.87.13 attackspam
unauthorized connection attempt
2020-02-19 18:45:17
46.209.117.210 attackbotsspam
Honeypot attack, port: 5555, PTR: PTR record not found
2020-02-19 18:33:12
122.51.132.60 attackspambots
Feb 19 08:00:53 lnxded63 sshd[18285]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.132.60
2020-02-19 18:19:13
190.186.79.86 attack
unauthorized connection attempt
2020-02-19 18:36:20
87.4.136.13 attack
unauthorized connection attempt
2020-02-19 18:13:54
211.62.133.154 attackspambots
unauthorized connection attempt
2020-02-19 18:45:54
114.32.20.49 attackspam
unauthorized connection attempt
2020-02-19 18:12:00
175.29.177.54 attackbotsspam
20/2/18@23:56:10: FAIL: Alarm-Network address from=175.29.177.54
...
2020-02-19 18:09:56
121.172.165.102 attackspam
unauthorized connection attempt
2020-02-19 18:30:29
59.126.14.253 attack
unauthorized connection attempt
2020-02-19 18:15:45
91.132.3.202 attackbots
Port 81 (TorPark onion routing) access denied
2020-02-19 18:32:29
222.186.175.202 attackbotsspam
Feb 19 11:20:56 sso sshd[20918]: Failed password for root from 222.186.175.202 port 12216 ssh2
Feb 19 11:21:00 sso sshd[20918]: Failed password for root from 222.186.175.202 port 12216 ssh2
...
2020-02-19 18:25:46
191.37.151.41 attackspambots
[portscan] tcp/22 [SSH]
*(RWIN=65535)(02191212)
2020-02-19 18:17:20
197.230.27.50 attackbotsspam
unauthorized connection attempt
2020-02-19 18:46:30
139.162.90.220 attackspam
Port 1723 scan denied
2020-02-19 18:10:10

Recently Reported IPs

61.160.250.164 109.106.143.234 90.142.36.250 104.148.64.202
216.172.160.103 2002:6894:401a::6894:401a 120.27.97.170 104.148.64.200
37.59.50.223 164.52.24.170 103.108.158.97 91.226.140.54
187.141.91.244 66.28.139.90 82.220.39.25 77.224.228.24
42.73.196.7 195.158.24.116 179.184.23.195 42.231.163.197