Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.238.106.199
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 2599
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.238.106.199.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022800 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 28 14:00:47 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 199.106.238.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 199.106.238.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.34.74.252 attackspam
Unauthorised access (Mar 18) SRC=117.34.74.252 LEN=40 TTL=243 ID=56788 TCP DPT=445 WINDOW=1024 SYN
2020-03-19 04:02:47
72.44.93.233 attack
SSH login attempts with user root.
2020-03-19 04:19:41
203.159.249.215 attackspam
Mar 18 19:49:25 ns382633 sshd\[20982\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.159.249.215  user=root
Mar 18 19:49:26 ns382633 sshd\[20982\]: Failed password for root from 203.159.249.215 port 35478 ssh2
Mar 18 19:53:20 ns382633 sshd\[21949\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.159.249.215  user=root
Mar 18 19:53:22 ns382633 sshd\[21949\]: Failed password for root from 203.159.249.215 port 59436 ssh2
Mar 18 19:56:27 ns382633 sshd\[22713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=203.159.249.215  user=root
2020-03-19 03:52:24
80.82.77.85 attackspambots
3392/tcp 3390/tcp 50000/tcp...
[2020-02-21/03-16]482pkt,258pt.(tcp)
2020-03-19 04:12:29
120.131.3.168 attack
Mar 18 14:43:06 lnxmail61 sshd[28325]: Failed password for root from 120.131.3.168 port 40978 ssh2
Mar 18 14:43:06 lnxmail61 sshd[28325]: Failed password for root from 120.131.3.168 port 40978 ssh2
2020-03-19 04:16:51
45.55.128.109 attackspambots
Mar 18 15:49:16 163-172-32-151 sshd[22605]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.128.109  user=root
Mar 18 15:49:18 163-172-32-151 sshd[22605]: Failed password for root from 45.55.128.109 port 46334 ssh2
...
2020-03-19 03:57:17
202.175.121.202 attackbots
SSH login attempts with user root.
2020-03-19 04:03:30
170.81.252.202 attackspambots
Mar 18 14:06:44 mout sshd[13087]: Connection closed by 170.81.252.202 port 36994 [preauth]
2020-03-19 03:59:48
123.207.167.233 attack
SSH Brute-Forcing (server2)
2020-03-19 04:24:44
220.88.1.208 attackspambots
Invalid user rstudio from 220.88.1.208 port 46295
2020-03-19 04:21:56
140.213.57.245 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2020-03-19 04:27:44
110.43.50.203 attackbots
Mar 18 18:22:54  sshd\[18580\]: User root from 110.43.50.203 not allowed because not listed in AllowUsersMar 18 18:22:56  sshd\[18580\]: Failed password for invalid user root from 110.43.50.203 port 53641 ssh2
...
2020-03-19 04:07:17
106.13.118.216 attack
Mar 18 15:11:49 localhost sshd\[17829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.118.216  user=root
Mar 18 15:11:51 localhost sshd\[17829\]: Failed password for root from 106.13.118.216 port 59356 ssh2
Mar 18 15:14:30 localhost sshd\[18512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.118.216  user=root
2020-03-19 04:12:09
111.229.199.67 attackbots
Mar 18 14:28:11 mail sshd[22258]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.199.67
Mar 18 14:28:14 mail sshd[22258]: Failed password for invalid user apache from 111.229.199.67 port 56292 ssh2
...
2020-03-19 04:00:12
45.117.176.23 attackspambots
Mar 18 22:41:27 hosting sshd[13498]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.117.176.23  user=root
Mar 18 22:41:28 hosting sshd[13498]: Failed password for root from 45.117.176.23 port 48808 ssh2
Mar 18 22:46:06 hosting sshd[13952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.117.176.23  user=root
Mar 18 22:46:08 hosting sshd[13952]: Failed password for root from 45.117.176.23 port 54946 ssh2
...
2020-03-19 04:03:14

Recently Reported IPs

95.174.181.96 225.52.28.105 17.127.28.184 182.135.107.46
159.159.134.221 8.203.176.123 80.40.189.18 221.192.204.34
4.179.203.125 36.178.95.251 84.119.134.168 88.11.168.111
107.223.30.39 17.187.37.76 131.200.165.71 173.111.40.98
162.15.103.186 134.85.157.47 75.87.142.74 136.27.188.190