Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.207.82.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37744
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.207.82.148.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri Jul 12 16:15:08 CST 2019
;; MSG SIZE  rcvd: 118
Host info
148.82.207.148.in-addr.arpa domain name pointer host-148.207.82.148.conacyt.mx.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
148.82.207.148.in-addr.arpa	name = host-148.207.82.148.conacyt.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
145.239.73.103 attackspam
Repeated brute force against a port
2020-03-25 16:32:39
213.217.0.201 attackbots
Scanning for open ports
2020-03-25 16:19:24
45.14.150.133 attack
Mar 25 07:41:10 yesfletchmain sshd\[29506\]: Invalid user deadly from 45.14.150.133 port 33860
Mar 25 07:41:10 yesfletchmain sshd\[29506\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.150.133
Mar 25 07:41:13 yesfletchmain sshd\[29506\]: Failed password for invalid user deadly from 45.14.150.133 port 33860 ssh2
Mar 25 07:49:51 yesfletchmain sshd\[29798\]: Invalid user informix from 45.14.150.133 port 48706
Mar 25 07:49:51 yesfletchmain sshd\[29798\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.14.150.133
...
2020-03-25 16:37:18
177.69.39.19 attackspam
Mar 25 06:54:10 vpn01 sshd[17795]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.69.39.19
Mar 25 06:54:11 vpn01 sshd[17795]: Failed password for invalid user honda from 177.69.39.19 port 48647 ssh2
...
2020-03-25 16:18:33
106.75.34.41 attackspambots
Invalid user chanda from 106.75.34.41 port 50550
2020-03-25 16:24:47
162.214.28.25 attackspambots
xmlrpc attack
2020-03-25 16:19:54
164.132.170.28 attack
MAGECART attack
2020-03-25 16:00:30
170.82.182.225 attackbots
2020-03-25T07:09:58.745084vps773228.ovh.net sshd[20134]: Invalid user ui from 170.82.182.225 port 40363
2020-03-25T07:09:58.758726vps773228.ovh.net sshd[20134]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.82.182.225
2020-03-25T07:09:58.745084vps773228.ovh.net sshd[20134]: Invalid user ui from 170.82.182.225 port 40363
2020-03-25T07:10:00.878262vps773228.ovh.net sshd[20134]: Failed password for invalid user ui from 170.82.182.225 port 40363 ssh2
2020-03-25T07:15:06.917007vps773228.ovh.net sshd[22083]: Invalid user ivo from 170.82.182.225 port 47284
...
2020-03-25 16:04:19
213.217.0.202 attackbots
Scanning for open ports
2020-03-25 16:08:40
51.77.215.227 attack
Invalid user direzione from 51.77.215.227 port 50934
2020-03-25 16:15:27
106.12.184.217 attackspam
Brute-force attempt banned
2020-03-25 16:21:38
14.242.84.86 attack
20/3/24@23:51:57: FAIL: Alarm-Network address from=14.242.84.86
20/3/24@23:51:57: FAIL: Alarm-Network address from=14.242.84.86
...
2020-03-25 16:06:30
134.175.59.225 attackbots
Invalid user clarissa from 134.175.59.225 port 48476
2020-03-25 16:15:10
72.167.224.135 attackbotsspam
$f2bV_matches
2020-03-25 16:46:02
45.119.212.14 attack
CMS (WordPress or Joomla) login attempt.
2020-03-25 16:42:13

Recently Reported IPs

95.173.156.5 179.108.240.178 103.133.108.21 182.61.18.17
114.210.226.222 189.175.80.159 81.248.73.17 198.112.165.199
91.194.163.228 228.198.37.173 180.249.111.77 171.244.139.15
194.214.192.28 52.26.198.220 102.23.150.218 92.126.222.172
204.1.18.131 45.13.39.18 156.220.146.221 92.238.51.136