Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 106.148.1.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6830
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;106.148.1.52.			IN	A

;; AUTHORITY SECTION:
.			183	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023112203 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 23 09:50:42 CST 2023
;; MSG SIZE  rcvd: 105
Host info
52.1.148.106.in-addr.arpa domain name pointer KD106148001052.au-net.ne.jp.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.1.148.106.in-addr.arpa	name = KD106148001052.au-net.ne.jp.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
41.38.152.84 attackspam
port scan and connect, tcp 80 (http)
2020-02-17 23:31:23
213.6.139.134 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 23:13:49
111.72.203.10 attackbotsspam
23/tcp
[2020-02-17]1pkt
2020-02-17 23:27:00
201.242.216.164 attackbotsspam
Feb 17 03:54:56 kapalua sshd\[30932\]: Invalid user ubuntu from 201.242.216.164
Feb 17 03:54:56 kapalua sshd\[30932\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.242.216.164
Feb 17 03:54:59 kapalua sshd\[30932\]: Failed password for invalid user ubuntu from 201.242.216.164 port 34801 ssh2
Feb 17 04:03:08 kapalua sshd\[31483\]: Invalid user postgres from 201.242.216.164
Feb 17 04:03:08 kapalua sshd\[31483\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.242.216.164
2020-02-17 23:24:20
187.120.144.52 attackspambots
port scan and connect, tcp 23 (telnet)
2020-02-17 23:17:00
187.52.13.34 attack
8000/tcp
[2020-02-17]1pkt
2020-02-17 23:20:32
59.126.60.144 attackspam
23/tcp
[2020-02-17]1pkt
2020-02-17 23:22:43
190.191.238.9 attack
23/tcp
[2020-02-17]1pkt
2020-02-17 23:40:15
27.72.81.176 attackspambots
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-02-17 23:40:47
177.53.83.183 attackspam
1581946714 - 02/17/2020 20:38:34 Host: 177-53-83-183.telecominternet.com.br/177.53.83.183 Port: 23 TCP Blocked
...
2020-02-17 23:14:47
213.59.156.187 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-17 23:45:36
192.241.224.245 attackbotsspam
TCP port 3389: Scan and connection
2020-02-17 23:19:27
206.189.129.174 attackbots
Feb 17 15:06:07 amit sshd\[9857\]: Invalid user sammy from 206.189.129.174
Feb 17 15:06:07 amit sshd\[9857\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.129.174
Feb 17 15:06:09 amit sshd\[9857\]: Failed password for invalid user sammy from 206.189.129.174 port 50298 ssh2
...
2020-02-17 23:37:42
110.49.70.247 attackspambots
Automatic report - Banned IP Access
2020-02-17 23:16:11
45.95.32.213 attackbots
$f2bV_matches
2020-02-17 23:03:14

Recently Reported IPs

106.147.27.238 106.148.11.13 106.148.15.21 106.147.4.29
106.148.130.182 106.147.59.223 106.147.241.51 106.148.18.50
106.147.180.218 106.147.138.228 106.147.19.156 106.148.112.47
106.147.56.240 106.147.71.150 106.148.116.9 106.148.172.82
106.147.179.251 106.148.191.189 106.147.217.44 106.147.218.145