Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.204.244.254
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38249
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.204.244.254.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 09:56:00 CST 2025
;; MSG SIZE  rcvd: 108
Host info
254.244.204.148.in-addr.arpa domain name pointer ciitajuarez-244.gw.ipn.mx.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
254.244.204.148.in-addr.arpa	name = ciitajuarez-244.gw.ipn.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
139.162.65.55 attackspam
firewall-block, port(s): 53/tcp
2019-11-28 04:13:07
193.29.15.169 attack
27.11.2019 19:34:56 Connection to port 1900 blocked by firewall
2019-11-28 03:53:12
200.82.226.43 attackspam
UTC: 2019-11-26 port: 23/tcp
2019-11-28 03:58:28
213.203.223.138 attackbotsspam
Nov 27 16:25:06 marvibiene sshd[38611]: Invalid user admin from 213.203.223.138 port 16702
Nov 27 16:25:06 marvibiene sshd[38611]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.203.223.138
Nov 27 16:25:06 marvibiene sshd[38611]: Invalid user admin from 213.203.223.138 port 16702
Nov 27 16:25:08 marvibiene sshd[38611]: Failed password for invalid user admin from 213.203.223.138 port 16702 ssh2
...
2019-11-28 04:04:00
182.162.143.236 attack
Nov 28 00:18:55 vibhu-HP-Z238-Microtower-Workstation sshd\[28639\]: Invalid user applmgr1 from 182.162.143.236
Nov 28 00:18:55 vibhu-HP-Z238-Microtower-Workstation sshd\[28639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.143.236
Nov 28 00:18:57 vibhu-HP-Z238-Microtower-Workstation sshd\[28639\]: Failed password for invalid user applmgr1 from 182.162.143.236 port 51874 ssh2
Nov 28 00:23:13 vibhu-HP-Z238-Microtower-Workstation sshd\[28853\]: Invalid user monkey from 182.162.143.236
Nov 28 00:23:13 vibhu-HP-Z238-Microtower-Workstation sshd\[28853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.143.236
...
2019-11-28 03:54:17
74.208.235.29 attack
Nov 28 01:15:27 vibhu-HP-Z238-Microtower-Workstation sshd\[31363\]: Invalid user ident from 74.208.235.29
Nov 28 01:15:27 vibhu-HP-Z238-Microtower-Workstation sshd\[31363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.235.29
Nov 28 01:15:29 vibhu-HP-Z238-Microtower-Workstation sshd\[31363\]: Failed password for invalid user ident from 74.208.235.29 port 45616 ssh2
Nov 28 01:21:35 vibhu-HP-Z238-Microtower-Workstation sshd\[31587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.235.29  user=root
Nov 28 01:21:37 vibhu-HP-Z238-Microtower-Workstation sshd\[31587\]: Failed password for root from 74.208.235.29 port 52684 ssh2
...
2019-11-28 03:59:33
192.95.42.29 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-28 04:14:27
60.251.111.30 attack
11/27/2019-09:49:32.368796 60.251.111.30 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-28 03:49:16
190.109.189.204 attackspam
UTC: 2019-11-26 port: 80/tcp
2019-11-28 04:09:25
78.110.60.23 attackbots
Nov 26 05:48:05 cumulus sshd[8449]: Invalid user terces from 78.110.60.23 port 44590
Nov 26 05:48:05 cumulus sshd[8449]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.110.60.23
Nov 26 05:48:07 cumulus sshd[8449]: Failed password for invalid user terces from 78.110.60.23 port 44590 ssh2
Nov 26 05:48:07 cumulus sshd[8449]: Received disconnect from 78.110.60.23 port 44590:11: Bye Bye [preauth]
Nov 26 05:48:07 cumulus sshd[8449]: Disconnected from 78.110.60.23 port 44590 [preauth]
Nov 26 06:28:17 cumulus sshd[10036]: Invalid user nylander from 78.110.60.23 port 38288
Nov 26 06:28:17 cumulus sshd[10036]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.110.60.23
Nov 26 06:28:19 cumulus sshd[10036]: Failed password for invalid user nylander from 78.110.60.23 port 38288 ssh2
Nov 26 06:28:19 cumulus sshd[10036]: Received disconnect from 78.110.60.23 port 38288:11: Bye Bye [preauth]
Nov 26 06:........
-------------------------------
2019-11-28 04:07:10
167.172.246.116 attackspam
UTC: 2019-11-26 port: 22/tcp
2019-11-28 03:39:47
175.161.8.219 attackbots
fail2ban - Attack against Apache (too many 404s)
2019-11-28 04:06:24
118.126.108.213 attackspambots
Nov 27 18:59:13 MK-Soft-VM8 sshd[19679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.126.108.213 
Nov 27 18:59:15 MK-Soft-VM8 sshd[19679]: Failed password for invalid user zhanghua123 from 118.126.108.213 port 41466 ssh2
...
2019-11-28 03:52:23
92.118.37.99 attackspam
firewall-block, port(s): 33006/tcp, 33015/tcp
2019-11-28 03:53:54
104.211.114.71 attackbots
Lines containing failures of 104.211.114.71
Nov 25 12:09:01 box sshd[10053]: Did not receive identification string from 104.211.114.71 port 52580
Nov 25 12:10:17 box sshd[10499]: Did not receive identification string from 104.211.114.71 port 55930
Nov 25 12:11:16 box sshd[10506]: Invalid user guest from 104.211.114.71 port 48160
Nov 25 12:11:16 box sshd[10506]: Received disconnect from 104.211.114.71 port 48160:11: Normal Shutdown, Thank you for playing [preauth]
Nov 25 12:11:16 box sshd[10506]: Disconnected from invalid user guest 104.211.114.71 port 48160 [preauth]
Nov 25 12:12:23 box sshd[10508]: Invalid user matt from 104.211.114.71 port 40208
Nov 25 12:12:24 box sshd[10508]: Received disconnect from 104.211.114.71 port 40208:11: Normal Shutdown, Thank you for playing [preauth]
Nov 25 12:12:24 box sshd[10508]: Disconnected from invalid user matt 104.211.114.71 port 40208 [preauth]
Nov 25 12:13:34 box sshd[10523]: Invalid user ubuntu from 104.211.114.71 port 60532
Nov........
------------------------------
2019-11-28 04:02:28

Recently Reported IPs

29.53.192.99 108.118.249.61 32.66.227.6 139.4.173.75
74.30.99.68 247.10.62.52 40.183.203.69 235.248.101.147
69.156.185.198 89.197.8.74 42.232.229.166 169.179.19.134
60.210.172.30 140.0.133.56 72.188.86.212 251.75.200.104
146.199.121.17 220.134.119.208 13.214.250.74 58.91.69.226