Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.119.245.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3820
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.119.245.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 04:59:18 CST 2025
;; MSG SIZE  rcvd: 107
Host info
13.245.119.148.in-addr.arpa domain name pointer 13.245.119.148.in-addr.arpa.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
13.245.119.148.in-addr.arpa	name = 13.245.119.148.in-addr.arpa.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
121.165.73.1 attackspambots
Unauthorized connection attempt detected from IP address 121.165.73.1 to port 2220 [J]
2020-01-13 18:40:21
106.12.27.107 attackspam
Jan  6 15:23:43 git-ovh sshd[29642]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.107 
Jan  6 15:23:44 git-ovh sshd[29642]: Failed password for invalid user gopher from 106.12.27.107 port 40256 ssh2
...
2020-01-13 18:44:40
36.235.45.78 attackbots
unauthorized connection attempt
2020-01-13 18:47:53
110.232.86.101 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-13 19:00:06
202.147.199.227 attackspam
1578899079 - 01/13/2020 08:04:39 Host: 202.147.199.227/202.147.199.227 Port: 445 TCP Blocked
2020-01-13 18:36:10
148.0.63.43 attackspam
2020-01-13T06:40:34.079406scmdmz1 sshd[28390]: Invalid user mmy from 148.0.63.43 port 49124
2020-01-13T06:40:34.083074scmdmz1 sshd[28390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.0.63.43
2020-01-13T06:40:34.079406scmdmz1 sshd[28390]: Invalid user mmy from 148.0.63.43 port 49124
2020-01-13T06:40:36.207470scmdmz1 sshd[28390]: Failed password for invalid user mmy from 148.0.63.43 port 49124 ssh2
2020-01-13T06:43:14.140161scmdmz1 sshd[28576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.0.63.43  user=root
2020-01-13T06:43:16.229426scmdmz1 sshd[28576]: Failed password for root from 148.0.63.43 port 48230 ssh2
...
2020-01-13 18:42:42
179.97.83.173 attack
Unauthorized connection attempt detected from IP address 179.97.83.173 to port 23 [J]
2020-01-13 18:38:46
182.76.29.59 attack
Honeypot attack, port: 445, PTR: nsg-static-59.29.76.182-airtel.com.
2020-01-13 18:25:50
58.217.101.207 attack
SSH Brute Force
2020-01-13 18:46:00
148.70.18.221 attack
Jan 13 05:09:52 vtv3 sshd[31214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.18.221 
Jan 13 05:09:54 vtv3 sshd[31214]: Failed password for invalid user server from 148.70.18.221 port 43028 ssh2
Jan 13 05:13:46 vtv3 sshd[794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.18.221 
Jan 13 05:25:34 vtv3 sshd[6662]: Failed password for root from 148.70.18.221 port 40144 ssh2
Jan 13 05:29:19 vtv3 sshd[8039]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.18.221 
Jan 13 05:29:22 vtv3 sshd[8039]: Failed password for invalid user lefty from 148.70.18.221 port 57016 ssh2
Jan 13 05:41:09 vtv3 sshd[13809]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.18.221 
Jan 13 05:41:11 vtv3 sshd[13809]: Failed password for invalid user git from 148.70.18.221 port 56282 ssh2
Jan 13 05:43:14 vtv3 sshd[14588]: pam_unix(sshd:auth): authentic
2020-01-13 18:31:12
182.23.56.46 attackbotsspam
1578890865 - 01/13/2020 05:47:45 Host: 182.23.56.46/182.23.56.46 Port: 445 TCP Blocked
2020-01-13 18:56:19
62.234.91.237 attack
Jan 13 10:56:09 vpn01 sshd[15862]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.91.237
Jan 13 10:56:11 vpn01 sshd[15862]: Failed password for invalid user alliance from 62.234.91.237 port 46254 ssh2
...
2020-01-13 18:35:44
175.211.66.93 attackspambots
Honeypot attack, port: 5555, PTR: PTR record not found
2020-01-13 18:27:52
103.115.104.229 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.104.229  user=root
Failed password for root from 103.115.104.229 port 49140 ssh2
Invalid user hm from 103.115.104.229 port 50344
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.115.104.229
Failed password for invalid user hm from 103.115.104.229 port 50344 ssh2
2020-01-13 18:38:16
47.111.229.152 attackspambots
/public/js/wind.js
2020-01-13 18:59:42

Recently Reported IPs

215.120.115.47 84.61.141.180 141.72.46.235 233.113.71.77
122.122.209.70 58.63.112.97 29.211.29.180 2.162.19.100
153.4.84.39 149.84.187.25 175.132.71.159 27.104.173.28
237.182.112.5 109.67.50.146 224.218.176.72 150.176.33.96
35.184.35.194 8.122.50.167 243.50.8.199 106.82.23.127