Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.187.48.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59271
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.187.48.199.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 16:04:21 CST 2025
;; MSG SIZE  rcvd: 107
Host info
199.48.187.148.in-addr.arpa domain name pointer nid04262.daint.cscs.ch.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
199.48.187.148.in-addr.arpa	name = nid04262.daint.cscs.ch.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.55.188.133 attackspam
Invalid user gamefiles from 45.55.188.133 port 58120
2019-11-16 14:08:57
148.70.65.31 attack
Nov 16 00:50:06 ny01 sshd[21433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.65.31
Nov 16 00:50:08 ny01 sshd[21433]: Failed password for invalid user webadmin from 148.70.65.31 port 62098 ssh2
Nov 16 00:55:23 ny01 sshd[22473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.65.31
2019-11-16 13:58:29
205.170.93.196 attackbots
23/tcp 23/tcp 23/tcp...
[2019-10-03/11-16]4pkt,1pt.(tcp)
2019-11-16 13:53:52
222.186.180.6 attackspam
Nov 16 07:32:23 SilenceServices sshd[10338]: Failed password for root from 222.186.180.6 port 33112 ssh2
Nov 16 07:32:27 SilenceServices sshd[10338]: Failed password for root from 222.186.180.6 port 33112 ssh2
Nov 16 07:32:37 SilenceServices sshd[10338]: error: maximum authentication attempts exceeded for root from 222.186.180.6 port 33112 ssh2 [preauth]
2019-11-16 14:42:32
187.162.50.31 attackbotsspam
Automatic report - Port Scan Attack
2019-11-16 14:27:27
128.199.173.127 attackbotsspam
leo_www
2019-11-16 14:18:30
211.187.9.234 attackbots
Telnet Server BruteForce Attack
2019-11-16 14:15:43
60.209.242.46 attackbotsspam
23/tcp 23/tcp
[2019-11-12/16]2pkt
2019-11-16 13:58:54
69.94.155.176 attack
445/tcp 1433/tcp...
[2019-10-11/11-16]4pkt,2pt.(tcp)
2019-11-16 13:56:32
104.244.75.179 attackspambots
22/tcp 23/tcp...
[2019-10-22/11-15]66pkt,2pt.(tcp)
2019-11-16 14:01:24
106.13.56.72 attackspam
Nov 16 06:01:52 SilenceServices sshd[15343]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.56.72
Nov 16 06:01:54 SilenceServices sshd[15343]: Failed password for invalid user guest3333 from 106.13.56.72 port 49936 ssh2
Nov 16 06:07:18 SilenceServices sshd[16952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.56.72
2019-11-16 14:07:07
178.62.236.68 attack
Banned for posting to wp-login.php without referer {"log":"","pwd":"admin123!","wp-submit":"Log In","redirect_to":"http:\/\/douglasjohnstonre.com\/blog\/wp-admin\/","testcookie":"1"}
2019-11-16 14:19:34
46.38.144.17 attack
Nov 16 07:20:21 relay postfix/smtpd\[26001\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 16 07:20:41 relay postfix/smtpd\[31201\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 16 07:20:58 relay postfix/smtpd\[32243\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 16 07:21:18 relay postfix/smtpd\[333\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 16 07:21:36 relay postfix/smtpd\[27065\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-16 14:22:53
106.53.82.166 attackspambots
Nov 16 05:31:14 Ubuntu-1404-trusty-64-minimal sshd\[17820\]: Invalid user ssh from 106.53.82.166
Nov 16 05:31:14 Ubuntu-1404-trusty-64-minimal sshd\[17820\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.82.166
Nov 16 05:31:15 Ubuntu-1404-trusty-64-minimal sshd\[17820\]: Failed password for invalid user ssh from 106.53.82.166 port 52932 ssh2
Nov 16 05:55:20 Ubuntu-1404-trusty-64-minimal sshd\[3598\]: Invalid user yoyo from 106.53.82.166
Nov 16 05:55:20 Ubuntu-1404-trusty-64-minimal sshd\[3598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.82.166
2019-11-16 14:04:35
178.62.33.138 attackspambots
Nov 16 05:51:58 MK-Soft-VM3 sshd[14334]: Failed password for root from 178.62.33.138 port 55682 ssh2
...
2019-11-16 13:55:04

Recently Reported IPs

16.175.111.175 177.162.121.233 86.58.9.214 220.185.114.94
202.53.223.144 250.187.43.204 150.164.167.115 61.23.57.192
232.214.103.169 34.208.228.187 232.154.51.253 55.172.127.49
222.221.153.106 195.255.204.132 189.207.38.185 41.10.242.153
230.103.174.25 213.91.177.47 154.224.160.186 67.22.249.112