Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.220.39.194
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38941
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.220.39.194.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 57 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 19:05:58 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 194.39.220.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 194.39.220.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
168.245.117.238 attackspam
Return-Path: bounces+17224171-eb2b-office=bon-it.co.uk@sendgrid.net
Received: from xvfrtrzz.outbound-mail.sendgrid.net (xvfrtrzz.outbound-mail.sendgrid.net [168.245.117.238])
We recently reviewed your account, and we suspect an unauthorized activity.
For security reasons your Online Banking access to your accounts has been blocked to prevent unauthorised use.
2020-06-29 22:41:08
68.183.133.156 attackspambots
Invalid user gt from 68.183.133.156 port 36916
2020-06-29 22:53:20
103.75.149.121 attackbotsspam
Invalid user venkat from 103.75.149.121 port 45478
2020-06-29 23:07:51
5.94.203.205 attackbotsspam
Fail2Ban - SSH Bruteforce Attempt
2020-06-29 23:19:23
68.183.203.187 attackbots
 TCP (SYN) 68.183.203.187:51976 -> port 8867, len 44
2020-06-29 23:14:50
150.109.45.228 attackspam
Jun 29 14:31:46 scw-6657dc sshd[3161]: Failed password for root from 150.109.45.228 port 53250 ssh2
Jun 29 14:31:46 scw-6657dc sshd[3161]: Failed password for root from 150.109.45.228 port 53250 ssh2
Jun 29 14:37:53 scw-6657dc sshd[3362]: Invalid user yzj from 150.109.45.228 port 46900
...
2020-06-29 23:31:37
150.143.244.36 attack
Automated report (2020-06-29T04:34:35-07:00). Caught masquerading as Facebook external hit. Caught masquerading as Twitterbot.
2020-06-29 23:14:26
180.76.52.3 attackspam
Jun 29 14:32:17 lnxded63 sshd[29613]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.52.3
2020-06-29 23:18:16
179.97.57.43 attackspambots
From send-julio-1618-alkosa.com.br-8@opered.com.br Mon Jun 29 08:10:54 2020
Received: from mm57-43.opered.com.br ([179.97.57.43]:60656)
2020-06-29 22:57:48
186.4.156.61 attackspambots
Brute forcing RDP port 3389
2020-06-29 22:41:59
116.236.251.214 attack
2020-06-29T15:34:08.859926galaxy.wi.uni-potsdam.de sshd[19940]: Invalid user test from 116.236.251.214 port 45099
2020-06-29T15:34:08.864920galaxy.wi.uni-potsdam.de sshd[19940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.251.214
2020-06-29T15:34:08.859926galaxy.wi.uni-potsdam.de sshd[19940]: Invalid user test from 116.236.251.214 port 45099
2020-06-29T15:34:10.888182galaxy.wi.uni-potsdam.de sshd[19940]: Failed password for invalid user test from 116.236.251.214 port 45099 ssh2
2020-06-29T15:37:07.933476galaxy.wi.uni-potsdam.de sshd[20262]: Invalid user oracle from 116.236.251.214 port 32404
2020-06-29T15:37:07.938508galaxy.wi.uni-potsdam.de sshd[20262]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.251.214
2020-06-29T15:37:07.933476galaxy.wi.uni-potsdam.de sshd[20262]: Invalid user oracle from 116.236.251.214 port 32404
2020-06-29T15:37:10.202693galaxy.wi.uni-potsdam.de sshd[20262]: F
...
2020-06-29 22:50:11
82.132.231.61 attack
Origin of recurrent spam.
2020-06-29 23:24:42
13.72.77.101 attackbots
Brute forcing email accounts
2020-06-29 23:31:11
2.176.50.125 attackspam
IP 2.176.50.125 attacked honeypot on port: 8080 at 6/29/2020 4:11:22 AM
2020-06-29 22:40:38
222.186.31.83 attack
Jun 29 16:33:24 * sshd[25051]: Failed password for root from 222.186.31.83 port 51744 ssh2
2020-06-29 22:45:55

Recently Reported IPs

104.166.36.199 200.103.14.234 42.205.121.249 132.8.97.36
142.183.232.122 36.86.55.192 82.104.175.227 16.235.25.105
227.37.99.156 137.85.90.0 48.87.83.218 203.54.154.122
198.58.155.219 160.16.164.194 175.105.138.53 70.141.34.235
214.136.11.247 116.220.222.218 118.211.170.69 115.121.143.172