Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.148.144.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 5125
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.148.144.141.		IN	A

;; AUTHORITY SECTION:
.			117	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051801 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 06:42:18 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 141.144.148.107.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.144.148.107.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.198.71.220 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-08-15 19:25:00
103.146.202.160 attackbotsspam
frenzy
2020-08-15 19:46:05
77.27.168.117 attack
frenzy
2020-08-15 19:12:18
128.199.170.33 attackspam
frenzy
2020-08-15 19:29:05
185.220.103.4 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-08-15 19:33:18
200.119.45.66 attackspambots
WEB Remote Command Execution via Shell Script -1.a
2020-08-15 19:20:49
112.85.42.174 attack
Aug 15 11:29:38 rush sshd[31180]: Failed password for root from 112.85.42.174 port 5221 ssh2
Aug 15 11:29:41 rush sshd[31180]: Failed password for root from 112.85.42.174 port 5221 ssh2
Aug 15 11:29:45 rush sshd[31180]: Failed password for root from 112.85.42.174 port 5221 ssh2
Aug 15 11:29:48 rush sshd[31180]: Failed password for root from 112.85.42.174 port 5221 ssh2
...
2020-08-15 19:32:34
92.222.79.157 attackspam
*Port Scan* detected from 92.222.79.157 (FR/France/Grand Est/Strasbourg/157.ip-92-222-79.eu). 4 hits in the last 100 seconds
2020-08-15 19:42:34
183.166.162.139 attackspambots
Fail2Ban Ban Triggered
HTTP SQL Injection Attempt
2020-08-15 19:24:03
103.205.179.22 attack
Port Scan
...
2020-08-15 19:46:57
45.225.160.235 attackbotsspam
Aug 15 10:35:51 Ubuntu-1404-trusty-64-minimal sshd\[17245\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.235  user=root
Aug 15 10:35:53 Ubuntu-1404-trusty-64-minimal sshd\[17245\]: Failed password for root from 45.225.160.235 port 36694 ssh2
Aug 15 10:55:10 Ubuntu-1404-trusty-64-minimal sshd\[26683\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.235  user=root
Aug 15 10:55:12 Ubuntu-1404-trusty-64-minimal sshd\[26683\]: Failed password for root from 45.225.160.235 port 49446 ssh2
Aug 15 10:59:14 Ubuntu-1404-trusty-64-minimal sshd\[28106\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.225.160.235  user=root
2020-08-15 19:42:59
217.170.205.14 attackspambots
sshd
2020-08-15 19:11:30
164.132.250.128 attackbots
Jul 20 23:01:00 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128]
Jul 20 23:01:04 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128]
Jul 20 23:01:07 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128]
Jul 20 23:01:11 localhost postfix/smtpd[1702585]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128]
Jul 21 08:26:43 localhost postfix/smtpd[1840999]: lost connection after AUTH from ip128.ip-164-132-250.eu[164.132.250.128]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=164.132.250.128
2020-08-15 19:45:18
146.88.240.4 attack
 UDP 146.88.240.4:35084 -> port 389, len 81
2020-08-15 19:15:58
88.248.13.75 attackbotsspam
Automatic report - Port Scan Attack
2020-08-15 19:14:05

Recently Reported IPs

107.148.142.25 107.148.144.166 107.148.144.71 107.148.145.138
107.148.145.17 107.148.150.20 107.148.18.247 107.148.181.104
107.148.185.228 107.148.191.244 107.148.193.144 107.148.194.106
107.148.198.103 107.148.198.97 107.148.199.80 107.148.20.51
107.148.200.9 107.148.202.87 107.148.204.146 107.148.209.177