Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 107.148.38.43
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59907
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;107.148.38.43.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121703 1800 900 604800 86400

;; Query time: 5 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 18 11:07:16 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 43.38.148.107.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 43.38.148.107.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.112.129.199 attackspam
Apr  4 22:31:42 gw1 sshd[2924]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.129.199
Apr  4 22:31:44 gw1 sshd[2924]: Failed password for invalid user vmuser from 193.112.129.199 port 54958 ssh2
...
2020-04-05 04:05:04
37.59.61.13 attackspam
fail2ban -- 37.59.61.13
...
2020-04-05 04:33:34
89.200.252.147 attackbotsspam
9530/tcp 23/tcp
[2020-03-11/04-04]2pkt
2020-04-05 04:33:06
205.185.124.153 attackbotsspam
Invalid user fake from 205.185.124.153 port 53080
2020-04-05 04:02:25
176.110.120.82 attackbotsspam
445/tcp 445/tcp 445/tcp...
[2020-03-07/04-04]5pkt,1pt.(tcp)
2020-04-05 04:05:31
106.12.186.121 attack
Apr  4 20:57:05 [HOSTNAME] sshd[1733]: User **removed** from 106.12.186.121 not allowed because not listed in AllowUsers
Apr  4 20:57:05 [HOSTNAME] sshd[1733]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.186.121  user=**removed**
Apr  4 20:57:07 [HOSTNAME] sshd[1733]: Failed password for invalid user **removed** from 106.12.186.121 port 11867 ssh2
...
2020-04-05 03:56:49
41.47.19.69 attackbots
Apr  4 15:35:05 debian-2gb-nbg1-2 kernel: \[8266340.599157\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=41.47.19.69 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=49 ID=50573 PROTO=TCP SPT=33442 DPT=23 WINDOW=31301 RES=0x00 SYN URGP=0
2020-04-05 04:24:05
178.176.170.201 attackbotsspam
1586007297 - 04/04/2020 15:34:57 Host: 178.176.170.201/178.176.170.201 Port: 445 TCP Blocked
2020-04-05 04:31:51
219.159.14.12 attackspam
1433/tcp 1433/tcp 1433/tcp...
[2020-02-09/04-04]4pkt,1pt.(tcp)
2020-04-05 04:19:53
134.209.45.250 attackspambots
DigitalOcean BotNet attack - 10s of requests to non- pages - :443/app-ads.txt - typically bursts of 8 requests per second - undefined, XSS attacks
UA removed
2020-04-05 04:05:57
66.147.237.24 attackspam
Honeypot attack, port: 445, PTR: server.sapkalicocuk.com.
2020-04-05 04:25:01
23.225.172.10 attackspam
firewall-block, port(s): 8888/tcp, 8899/tcp, 9090/tcp, 9991/tcp
2020-04-05 04:09:57
118.24.7.98 attackbotsspam
SSH invalid-user multiple login try
2020-04-05 04:15:56
183.81.84.141 attack
1586007325 - 04/04/2020 15:35:25 Host: 183.81.84.141/183.81.84.141 Port: 445 TCP Blocked
2020-04-05 03:58:33
192.241.239.112 attackbotsspam
20547/tcp 2181/tcp 873/tcp...
[2020-02-06/04-04]25pkt,23pt.(tcp),1pt.(udp)
2020-04-05 03:54:18

Recently Reported IPs

252.56.93.132 213.78.61.41 89.73.234.249 200.80.133.36
242.109.99.136 66.65.163.14 64.21.162.37 60.254.117.132
123.143.188.215 149.148.37.146 23.85.156.2 105.19.100.70
122.135.254.81 82.94.3.254 239.83.187.245 54.104.101.13
38.193.149.88 147.78.238.177 167.16.10.150 100.7.150.54