Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.123.0.197
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20391
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.123.0.197.			IN	A

;; AUTHORITY SECTION:
.			125	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082001 1800 900 604800 86400

;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 21 09:05:59 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 197.0.123.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 197.0.123.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.104.17.139 attack
Aug 26 03:52:37 tdfoods sshd\[945\]: Invalid user anamaria from 103.104.17.139
Aug 26 03:52:37 tdfoods sshd\[945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.17.139
Aug 26 03:52:39 tdfoods sshd\[945\]: Failed password for invalid user anamaria from 103.104.17.139 port 42288 ssh2
Aug 26 03:57:33 tdfoods sshd\[1557\]: Invalid user muh from 103.104.17.139
Aug 26 03:57:33 tdfoods sshd\[1557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.104.17.139
2019-08-26 22:08:05
144.217.234.174 attackbots
Aug 26 15:53:59 SilenceServices sshd[17981]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.234.174
Aug 26 15:54:01 SilenceServices sshd[17981]: Failed password for invalid user paola from 144.217.234.174 port 33922 ssh2
Aug 26 15:58:14 SilenceServices sshd[19613]: Failed password for root from 144.217.234.174 port 56676 ssh2
2019-08-26 23:10:39
210.21.226.2 attack
Aug 26 13:37:36 MK-Soft-VM6 sshd\[18225\]: Invalid user ftptest from 210.21.226.2 port 42266
Aug 26 13:37:36 MK-Soft-VM6 sshd\[18225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.21.226.2
Aug 26 13:37:38 MK-Soft-VM6 sshd\[18225\]: Failed password for invalid user ftptest from 210.21.226.2 port 42266 ssh2
...
2019-08-26 22:26:19
149.56.44.47 attackbots
Aug 26 04:54:38 web1 sshd\[22916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.44.47  user=sshd
Aug 26 04:54:40 web1 sshd\[22916\]: Failed password for sshd from 149.56.44.47 port 41108 ssh2
Aug 26 04:54:42 web1 sshd\[22916\]: Failed password for sshd from 149.56.44.47 port 41108 ssh2
Aug 26 04:54:44 web1 sshd\[22916\]: Failed password for sshd from 149.56.44.47 port 41108 ssh2
Aug 26 04:54:47 web1 sshd\[22916\]: Failed password for sshd from 149.56.44.47 port 41108 ssh2
2019-08-26 23:04:50
83.97.20.145 attackbotsspam
Unauthorised access (Aug 26) SRC=83.97.20.145 LEN=40 TTL=50 ID=47419 TCP DPT=8080 WINDOW=63944 SYN 
Unauthorised access (Aug 26) SRC=83.97.20.145 LEN=40 TTL=50 ID=43055 TCP DPT=8080 WINDOW=63944 SYN 
Unauthorised access (Aug 26) SRC=83.97.20.145 LEN=40 TTL=50 ID=4412 TCP DPT=8080 WINDOW=18491 SYN 
Unauthorised access (Aug 25) SRC=83.97.20.145 LEN=40 TTL=50 ID=58959 TCP DPT=8080 WINDOW=63944 SYN 
Unauthorised access (Aug 25) SRC=83.97.20.145 LEN=40 TTL=50 ID=9466 TCP DPT=8080 WINDOW=63944 SYN 
Unauthorised access (Aug 25) SRC=83.97.20.145 LEN=40 TTL=50 ID=45074 TCP DPT=8080 WINDOW=63944 SYN
2019-08-26 22:57:56
185.216.140.252 attack
08/26/2019-09:46:40.513533 185.216.140.252 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-08-26 22:26:44
189.212.3.151 attackspambots
Automatic report - Port Scan Attack
2019-08-26 22:28:33
82.119.100.182 attack
Aug 26 15:49:51 meumeu sshd[23748]: Failed password for invalid user qz from 82.119.100.182 port 11393 ssh2
Aug 26 15:53:57 meumeu sshd[24176]: Failed password for invalid user sshserver from 82.119.100.182 port 46049 ssh2
...
2019-08-26 22:46:41
222.186.42.163 attackbots
2019-08-26T14:26:47.012700abusebot-2.cloudsearch.cf sshd\[14135\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.163  user=root
2019-08-26 22:37:16
178.33.234.234 attack
Aug 26 04:22:44 auw2 sshd\[17740\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns338958.ip-178-33-234.eu  user=sshd
Aug 26 04:22:46 auw2 sshd\[17740\]: Failed password for sshd from 178.33.234.234 port 42610 ssh2
Aug 26 04:26:51 auw2 sshd\[18081\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns338958.ip-178-33-234.eu  user=root
Aug 26 04:26:53 auw2 sshd\[18081\]: Failed password for root from 178.33.234.234 port 60404 ssh2
Aug 26 04:31:49 auw2 sshd\[18472\]: Invalid user gogs from 178.33.234.234
Aug 26 04:31:49 auw2 sshd\[18472\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns338958.ip-178-33-234.eu
2019-08-26 22:32:43
213.21.67.184 attackspambots
Aug 26 04:37:49 friendsofhawaii sshd\[6917\]: Invalid user Nicole from 213.21.67.184
Aug 26 04:37:49 friendsofhawaii sshd\[6917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=h213-21-67-184.cust.a3fiber.se
Aug 26 04:37:51 friendsofhawaii sshd\[6917\]: Failed password for invalid user Nicole from 213.21.67.184 port 46229 ssh2
Aug 26 04:43:19 friendsofhawaii sshd\[7469\]: Invalid user deploy from 213.21.67.184
Aug 26 04:43:19 friendsofhawaii sshd\[7469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=h213-21-67-184.cust.a3fiber.se
2019-08-26 22:54:56
92.62.139.103 attackbots
Reported by AbuseIPDB proxy server.
2019-08-26 22:45:56
37.210.201.211 attackbotsspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-26 22:53:03
222.186.42.15 attack
2019-08-26T14:17:33.868333Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 222.186.42.15:35290 \(107.175.91.48:22\) \[session: 06254d62c574\]
2019-08-26T14:20:42.488991Z \[cowrie.ssh.factory.CowrieSSHFactory\] New connection: 222.186.42.15:25294 \(107.175.91.48:22\) \[session: fc2362663e74\]
...
2019-08-26 22:20:48
37.191.172.177 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-26 22:48:42

Recently Reported IPs

96.244.107.73 139.127.182.90 120.132.210.50 92.132.26.99
177.167.105.168 154.69.111.212 174.57.52.67 166.211.254.252
18.157.11.91 167.249.190.230 116.126.177.74 229.20.253.194
93.229.242.39 157.245.227.146 29.58.7.214 58.219.57.233
190.229.70.130 129.226.174.26 98.109.110.110 13.56.163.81