Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.112.141.63
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44923
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.112.141.63.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022201 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 23 04:44:23 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 63.141.112.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 63.141.112.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
59.148.235.4 attackspambots
uvcm 59.148.235.4 [28/Sep/2020:16:15:03 "-" "POST /wp-login.php 200 6728
59.148.235.4 [28/Sep/2020:16:15:04 "-" "GET /wp-login.php 200 6619
59.148.235.4 [28/Sep/2020:16:15:05 "-" "POST /wp-login.php 200 6726
2020-09-29 21:09:15
106.13.84.242 attack
2020-09-28T22:39:56.083375ks3355764 sshd[19445]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.84.242  user=root
2020-09-28T22:39:57.987202ks3355764 sshd[19445]: Failed password for root from 106.13.84.242 port 36756 ssh2
...
2020-09-29 21:17:49
39.77.161.61 attackspambots
Portscan detected
2020-09-29 21:39:54
117.131.29.87 attackbotsspam
Sep 29 11:33:59 mavik sshd[23696]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.131.29.87  user=root
Sep 29 11:34:01 mavik sshd[23696]: Failed password for root from 117.131.29.87 port 49718 ssh2
Sep 29 11:35:09 mavik sshd[23755]: Invalid user postgres from 117.131.29.87
Sep 29 11:35:09 mavik sshd[23755]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.131.29.87
Sep 29 11:35:11 mavik sshd[23755]: Failed password for invalid user postgres from 117.131.29.87 port 33170 ssh2
...
2020-09-29 21:32:01
176.122.141.223 attackbots
Invalid user ben from 176.122.141.223 port 39574
2020-09-29 21:10:14
122.51.41.109 attack
Invalid user big from 122.51.41.109 port 35824
2020-09-29 21:43:40
161.35.236.158 attack
Port scan detected on ports: 4443[TCP], 4443[TCP], 4443[TCP]
2020-09-29 21:19:19
184.154.139.18 attackspambots
(From 1) 1
2020-09-29 21:35:13
49.247.135.55 attackspam
SSH Bruteforce Attempt on Honeypot
2020-09-29 21:18:25
221.6.206.26 attackbotsspam
Invalid user git from 221.6.206.26 port 34818
2020-09-29 21:22:09
218.237.253.167 attack
(sshd) Failed SSH login from 218.237.253.167 (KR/South Korea/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 29 09:02:42 jbs1 sshd[25365]: Invalid user angel from 218.237.253.167
Sep 29 09:02:42 jbs1 sshd[25365]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.237.253.167 
Sep 29 09:02:44 jbs1 sshd[25365]: Failed password for invalid user angel from 218.237.253.167 port 50728 ssh2
Sep 29 09:13:14 jbs1 sshd[29305]: Invalid user oracle from 218.237.253.167
Sep 29 09:13:14 jbs1 sshd[29305]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.237.253.167
2020-09-29 21:38:01
104.248.81.158 attack
Invalid user diana from 104.248.81.158 port 44426
2020-09-29 21:16:48
189.18.14.176 attackspambots
1601325574 - 09/28/2020 22:39:34 Host: 189.18.14.176/189.18.14.176 Port: 445 TCP Blocked
2020-09-29 21:34:06
221.149.43.38 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-29 21:14:57
161.97.116.140 attackbots
2020-09-28T15:39:32.025032morrigan.ad5gb.com proftpd[4188]: session[2321936] 51.81.135.67 (161.97.116.140[161.97.116.140]): mod_tls.c: error initializing session: Permission denied
2020-09-29 21:37:07

Recently Reported IPs

171.89.134.7 205.102.89.136 130.146.118.228 249.74.79.106
37.103.229.19 185.50.27.138 240.43.198.67 171.151.97.63
244.240.215.203 164.179.108.131 62.234.60.214 124.211.85.154
174.5.32.244 217.28.237.21 202.136.25.245 143.139.234.106
193.149.120.57 100.224.1.181 160.193.213.244 93.143.14.121