Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Phoenix

Region: Arizona

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.163.42.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24960
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.163.42.136.			IN	A

;; AUTHORITY SECTION:
.			551	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022042601 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 27 13:19:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
136.42.163.148.in-addr.arpa domain name pointer we.love.servers.at.ioflood.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
136.42.163.148.in-addr.arpa	name = we.love.servers.at.ioflood.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
195.54.160.21 attackspambots
Scanned 3 times in the last 24 hours on port 80
2020-09-02 08:48:18
89.35.39.180 attack
Attempting to access Wordpress login on a honeypot or private system.
2020-09-02 09:00:24
202.157.185.131 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-09-02 08:42:32
178.46.212.141 attackspam
" "
2020-09-02 09:09:21
198.23.159.154 attackbotsspam
 TCP (SYN) 198.23.159.154:52802 -> port 623, len 44
2020-09-02 08:49:41
14.207.160.60 attack
20/9/1@12:45:09: FAIL: Alarm-Network address from=14.207.160.60
...
2020-09-02 08:54:17
82.118.236.186 attack
Invalid user joao from 82.118.236.186 port 50232
2020-09-02 09:03:01
85.114.138.138 attack
Trolling for resource vulnerabilities
2020-09-02 08:53:14
103.255.5.45 attack
404 NOT FOUND
2020-09-02 08:50:44
185.132.53.84 attackbots
 TCP (SYN) 185.132.53.84:6400 -> port 8080, len 40
2020-09-02 09:02:16
37.29.40.85 attackbots
Unauthorized connection attempt from IP address 37.29.40.85 on Port 445(SMB)
2020-09-02 08:55:34
112.85.42.185 attackspam
Sep  2 02:30:26 PorscheCustomer sshd[16282]: Failed password for root from 112.85.42.185 port 33416 ssh2
Sep  2 02:36:01 PorscheCustomer sshd[16375]: Failed password for root from 112.85.42.185 port 43978 ssh2
...
2020-09-02 08:56:00
5.188.62.11 attackbotsspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "root" at 2020-09-02T00:55:16Z
2020-09-02 09:10:06
185.234.218.83 attackbotsspam
Aug 25 05:59:32 mail postfix/smtpd\[2053\]: warning: unknown\[185.234.218.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug 25 06:09:30 mail postfix/smtpd\[2522\]: warning: unknown\[185.234.218.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug 25 06:19:32 mail postfix/smtpd\[2519\]: warning: unknown\[185.234.218.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Aug 25 06:29:31 mail postfix/smtpd\[3336\]: warning: unknown\[185.234.218.83\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-02 09:07:44
51.255.173.70 attack
$f2bV_matches
2020-09-02 08:35:02

Recently Reported IPs

17.136.112.183 108.27.40.221 100.247.33.121 133.154.31.170
53.103.135.193 1.52.67.124 237.11.175.219 73.155.227.109
111.117.171.245 180.143.60.221 126.199.112.19 168.178.196.126
21.230.193.198 215.180.56.45 157.244.0.221 30.64.2.55
137.65.154.112 114.101.222.225 63.172.158.230 114.136.19.90