Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.244.148.1
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 14528
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;104.244.148.1.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 21:49:28 CST 2025
;; MSG SIZE  rcvd: 106
Host info
1.148.244.104.in-addr.arpa domain name pointer host-104-244-148-1.ustconline.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
1.148.244.104.in-addr.arpa	name = host-104-244-148-1.ustconline.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.63.174.149 attackspambots
Dec 28 15:24:56 srv-ubuntu-dev3 sshd[19906]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149  user=mysql
Dec 28 15:24:58 srv-ubuntu-dev3 sshd[19906]: Failed password for mysql from 14.63.174.149 port 33433 ssh2
Dec 28 15:27:34 srv-ubuntu-dev3 sshd[20119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149  user=root
Dec 28 15:27:36 srv-ubuntu-dev3 sshd[20119]: Failed password for root from 14.63.174.149 port 44637 ssh2
Dec 28 15:31:56 srv-ubuntu-dev3 sshd[20453]: Invalid user lewelling from 14.63.174.149
Dec 28 15:31:56 srv-ubuntu-dev3 sshd[20453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.63.174.149
Dec 28 15:31:56 srv-ubuntu-dev3 sshd[20453]: Invalid user lewelling from 14.63.174.149
Dec 28 15:31:58 srv-ubuntu-dev3 sshd[20453]: Failed password for invalid user lewelling from 14.63.174.149 port 55913 ssh2
Dec 28 15:34:40 srv-ubuntu-d
...
2019-12-28 23:05:31
122.152.197.6 attack
2019-12-28T15:00:08.020737shield sshd\[8253\]: Invalid user guest from 122.152.197.6 port 45022
2019-12-28T15:00:08.023771shield sshd\[8253\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.197.6
2019-12-28T15:00:09.495767shield sshd\[8253\]: Failed password for invalid user guest from 122.152.197.6 port 45022 ssh2
2019-12-28T15:04:15.830043shield sshd\[8966\]: Invalid user admsrv from 122.152.197.6 port 40022
2019-12-28T15:04:15.834365shield sshd\[8966\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.197.6
2019-12-28 23:13:44
123.16.108.73 attackspam
Unauthorized connection attempt from IP address 123.16.108.73 on Port 445(SMB)
2019-12-28 23:28:29
185.209.0.51 attackbots
12/28/2019-16:01:33.106236 185.209.0.51 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-28 23:07:46
71.6.233.234 attackspambots
firewall-block, port(s): 5431/tcp
2019-12-28 23:23:05
192.52.242.127 attackbots
Dec 28 15:25:56 v22018086721571380 sshd[9195]: Failed password for invalid user tmpuser from 192.52.242.127 port 55524 ssh2
2019-12-28 23:23:47
196.179.234.98 attackspambots
Dec 28 16:10:55 localhost sshd\[17821\]: Invalid user db!@\# from 196.179.234.98 port 37136
Dec 28 16:10:55 localhost sshd\[17821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.179.234.98
Dec 28 16:10:57 localhost sshd\[17821\]: Failed password for invalid user db!@\# from 196.179.234.98 port 37136 ssh2
2019-12-28 23:27:03
186.90.124.238 attackbotsspam
Unauthorized connection attempt from IP address 186.90.124.238 on Port 445(SMB)
2019-12-28 23:26:33
31.210.211.114 attack
Dec 28 10:33:52 plusreed sshd[11758]: Invalid user admin9999 from 31.210.211.114
...
2019-12-28 23:43:35
202.171.77.46 attackbotsspam
Time:     Sat Dec 28 11:11:19 2019 -0300
IP:       202.171.77.46 (NC/New Caledonia/202-171-77-46.h14.canl.nc)
Failures: 20 (WordPressBruteForcePOST)
Interval: 3600 seconds
Blocked:  Permanent Block
2019-12-28 23:32:55
200.178.4.103 attackbotsspam
Unauthorized connection attempt from IP address 200.178.4.103 on Port 445(SMB)
2019-12-28 23:23:29
146.185.180.19 attackbotsspam
Brute-force attempt banned
2019-12-28 23:06:46
144.217.243.216 attackspam
2019-12-28T14:56:21.450313shield sshd\[7641\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.ip-144-217-243.net  user=root
2019-12-28T14:56:23.099690shield sshd\[7641\]: Failed password for root from 144.217.243.216 port 52450 ssh2
2019-12-28T14:59:15.268648shield sshd\[8093\]: Invalid user iulie from 144.217.243.216 port 52874
2019-12-28T14:59:15.273433shield sshd\[8093\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.ip-144-217-243.net
2019-12-28T14:59:17.143980shield sshd\[8093\]: Failed password for invalid user iulie from 144.217.243.216 port 52874 ssh2
2019-12-28 23:13:29
145.239.11.235 attackbots
2019-12-28T16:16:17.794750host3.slimhost.com.ua sshd[1799229]: Invalid user admin from 145.239.11.235 port 33860
2019-12-28T16:16:17.798779host3.slimhost.com.ua sshd[1799229]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=linexos-prox02.linexos.eu
2019-12-28T16:16:17.794750host3.slimhost.com.ua sshd[1799229]: Invalid user admin from 145.239.11.235 port 33860
2019-12-28T16:16:20.673373host3.slimhost.com.ua sshd[1799229]: Failed password for invalid user admin from 145.239.11.235 port 33860 ssh2
2019-12-28T16:31:49.422017host3.slimhost.com.ua sshd[1804637]: Invalid user deguia from 145.239.11.235 port 53174
2019-12-28T16:31:49.427116host3.slimhost.com.ua sshd[1804637]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=linexos-prox02.linexos.eu
2019-12-28T16:31:49.422017host3.slimhost.com.ua sshd[1804637]: Invalid user deguia from 145.239.11.235 port 53174
2019-12-28T16:31:50.911174host3.slimhost.com.ua sshd[1
...
2019-12-28 23:45:15
1.55.246.228 attack
Unauthorized connection attempt from IP address 1.55.246.228 on Port 445(SMB)
2019-12-28 23:09:04

Recently Reported IPs

146.44.150.164 116.52.95.120 42.253.206.25 138.142.109.157
218.33.39.115 167.216.180.16 57.212.64.15 33.246.0.115
104.177.202.153 169.246.26.189 5.117.192.8 191.14.241.70
245.188.163.192 125.192.255.63 68.213.253.169 78.135.254.46
27.31.20.185 227.167.163.214 5.117.192.62 24.131.141.30