Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.205.48.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51698
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.205.48.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 17:16:51 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 148.48.205.136.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 136.205.48.148.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.175.93.101 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-20 23:34:59
37.49.231.121 attack
Portscan or hack attempt detected by psad/fwsnort
2020-03-20 23:20:44
92.118.160.9 attackspambots
GPL DNS named version attempt - port: 53 proto: UDP cat: Attempted Information Leak
2020-03-20 22:54:09
80.82.70.118 attackbots
03/20/2020-10:09:57.441595 80.82.70.118 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-20 23:05:06
89.144.47.246 attackbots
SIP/5060 Probe, BF, Hack -
2020-03-20 23:01:05
94.102.56.181 attack
firewall-block, port(s): 3726/tcp
2020-03-20 23:45:20
80.82.64.73 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-20 23:07:00
185.209.0.2 attackbotsspam
ET DROP Dshield Block Listed Source group 1 - port: 3947 proto: TCP cat: Misc Attack
2020-03-20 23:28:38
71.6.135.131 attackspam
Fail2Ban Ban Triggered
2020-03-20 23:11:50
5.8.18.88 attackspam
ET SCAN MS Terminal Server Traffic on Non-standard Port - port: 10000 proto: TCP cat: Attempted Information Leak
2020-03-20 23:22:23
185.209.0.83 attackspambots
ET DROP Dshield Block Listed Source group 1 - port: 5720 proto: TCP cat: Misc Attack
2020-03-20 23:27:24
46.105.132.32 attackbots
Unauthorized connection attempt from IP address 46.105.132.32 on Port 445(SMB)
2020-03-20 23:18:12
45.118.165.105 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 25 - port: 23 proto: TCP cat: Misc Attack
2020-03-20 23:18:50
79.137.97.65 attackbots
ET SCAN Sipvicious User-Agent Detected (friendly-scanner) - port: 5060 proto: UDP cat: Attempted Information Leak
2020-03-20 23:07:38
89.248.168.176 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-20 22:58:35

Recently Reported IPs

255.171.51.133 238.125.204.241 28.150.175.178 51.21.96.238
160.102.162.22 188.248.81.31 52.90.34.236 42.16.209.213
125.50.127.92 65.8.11.102 56.130.47.219 248.151.97.44
182.213.214.86 16.253.67.215 207.240.248.25 49.219.85.201
19.96.163.116 192.41.126.12 160.104.122.46 249.49.240.91