Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.199.211.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 58418
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.199.211.7.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 23:13:51 CST 2025
;; MSG SIZE  rcvd: 106
Host info
b'Host 7.211.199.148.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 148.199.211.7.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
89.248.162.168 attack
11/03/2019-12:07:52.399212 89.248.162.168 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-11-04 04:10:10
212.93.154.120 attackbotsspam
Automatic report - Port Scan Attack
2019-11-04 04:20:52
14.187.108.4 attackspambots
Nov  3 15:31:12 dev sshd\[23158\]: Invalid user admin from 14.187.108.4 port 45156
Nov  3 15:31:12 dev sshd\[23158\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.187.108.4
Nov  3 15:31:13 dev sshd\[23158\]: Failed password for invalid user admin from 14.187.108.4 port 45156 ssh2
2019-11-04 04:03:55
119.10.115.36 attack
Nov  3 17:37:06 v22018076622670303 sshd\[29053\]: Invalid user yl200899325 from 119.10.115.36 port 44421
Nov  3 17:37:06 v22018076622670303 sshd\[29053\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.10.115.36
Nov  3 17:37:08 v22018076622670303 sshd\[29053\]: Failed password for invalid user yl200899325 from 119.10.115.36 port 44421 ssh2
...
2019-11-04 04:11:11
153.92.127.204 attackbots
Nov  3 21:20:53 * sshd[25262]: Failed password for root from 153.92.127.204 port 56724 ssh2
2019-11-04 04:35:06
145.239.83.89 attack
2019-11-03T14:16:37.9961731495-001 sshd\[52834\]: Failed password for invalid user oracle from 145.239.83.89 port 35344 ssh2
2019-11-03T15:17:29.9356681495-001 sshd\[55146\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.ip-145-239-83.eu  user=root
2019-11-03T15:17:31.6812981495-001 sshd\[55146\]: Failed password for root from 145.239.83.89 port 43824 ssh2
2019-11-03T15:21:20.3504041495-001 sshd\[55303\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.ip-145-239-83.eu  user=root
2019-11-03T15:21:22.6996531495-001 sshd\[55303\]: Failed password for root from 145.239.83.89 port 53164 ssh2
2019-11-03T15:25:09.0335331495-001 sshd\[55423\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=89.ip-145-239-83.eu  user=root
...
2019-11-04 04:35:31
118.70.105.84 attackbots
Unauthorized connection attempt from IP address 118.70.105.84 on Port 445(SMB)
2019-11-04 04:02:39
110.164.77.42 attackspambots
Unauthorized connection attempt from IP address 110.164.77.42 on Port 445(SMB)
2019-11-04 04:35:52
196.41.122.39 attackspam
Automatic report - XMLRPC Attack
2019-11-04 04:33:10
43.243.128.213 attackbots
Fail2Ban - SSH Bruteforce Attempt
2019-11-04 04:20:40
121.254.26.153 attackspam
Nov  3 15:25:59 dev0-dcde-rnet sshd[1759]: Failed password for root from 121.254.26.153 port 47732 ssh2
Nov  3 15:31:13 dev0-dcde-rnet sshd[1767]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.254.26.153
Nov  3 15:31:15 dev0-dcde-rnet sshd[1767]: Failed password for invalid user pa from 121.254.26.153 port 57066 ssh2
2019-11-04 04:01:56
180.250.248.170 attackbotsspam
Nov  3 07:02:44 tdfoods sshd\[639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.248.170  user=uucp
Nov  3 07:02:47 tdfoods sshd\[639\]: Failed password for uucp from 180.250.248.170 port 56862 ssh2
Nov  3 07:07:35 tdfoods sshd\[1076\]: Invalid user user6 from 180.250.248.170
Nov  3 07:07:35 tdfoods sshd\[1076\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.248.170
Nov  3 07:07:37 tdfoods sshd\[1076\]: Failed password for invalid user user6 from 180.250.248.170 port 59088 ssh2
2019-11-04 04:14:54
199.195.252.213 attack
2019-11-03T15:54:09.875804abusebot-5.cloudsearch.cf sshd\[4651\]: Invalid user test from 199.195.252.213 port 51658
2019-11-04 04:25:39
197.50.148.104 attack
Unauthorized connection attempt from IP address 197.50.148.104 on Port 445(SMB)
2019-11-04 04:09:42
138.197.171.149 attack
Nov  3 20:51:32 srv206 sshd[27028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.171.149  user=root
Nov  3 20:51:34 srv206 sshd[27028]: Failed password for root from 138.197.171.149 port 45020 ssh2
...
2019-11-04 04:04:52

Recently Reported IPs

125.167.60.251 69.111.18.184 81.6.167.205 254.156.200.229
153.240.61.205 109.25.33.20 174.10.126.0 119.246.163.41
51.183.96.18 182.113.251.157 29.255.110.60 147.9.255.132
3.176.150.228 154.192.21.171 31.202.75.110 61.57.93.16
29.79.6.200 169.223.141.121 97.8.83.38 185.179.123.123