Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Guadalajara

Region: Jalisco

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: Axtel, S.A.B. de C.V.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
148.240.12.72 attackbotsspam
Automatic report - Port Scan Attack
2020-08-21 04:31:32
148.240.122.50 attackspam
Honeypot attack, port: 445, PTR: 148-240-122-50.reservada.static.axtel.net.
2020-02-02 01:58:29
148.240.12.157 attackbots
Unauthorized connection attempt detected from IP address 148.240.12.157 to port 23 [J]
2020-01-31 01:02:03
148.240.12.233 attack
Unauthorized connection attempt detected from IP address 148.240.12.233 to port 23 [J]
2020-01-30 23:47:48
148.240.12.233 attackbotsspam
unauthorized connection attempt
2020-01-28 21:21:28
148.240.12.157 attack
unauthorized connection attempt
2020-01-28 19:07:17
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.240.12.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55383
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.240.12.105.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019041800 1800 900 604800 86400

;; Query time: 7 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Thu Apr 18 19:30:01 +08 2019
;; MSG SIZE  rcvd: 118

Host info
105.12.240.148.in-addr.arpa domain name pointer dial-148-240-12-105.zone-1.ip.static-ftth.axtel.net.mx.
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

Non-authoritative answer:
105.12.240.148.in-addr.arpa	name = dial-148-240-12-105.zone-1.ip.static-ftth.axtel.net.mx.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
66.70.142.231 attackspambots
Aug 16 01:12:40 hosting sshd[5011]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=66.70.142.231  user=root
Aug 16 01:12:42 hosting sshd[5011]: Failed password for root from 66.70.142.231 port 58054 ssh2
...
2020-08-16 06:36:29
189.201.243.109 attack
Unauthorized connection attempt from IP address 189.201.243.109 on Port 445(SMB)
2020-08-16 06:02:19
83.48.89.147 attack
leo_www
2020-08-16 06:27:56
189.203.233.206 attackspambots
Unauthorized connection attempt from IP address 189.203.233.206 on Port 445(SMB)
2020-08-16 06:10:38
106.112.155.53 attack
Attempted connection to port 23.
2020-08-16 06:30:30
89.7.34.111 attack
SSH Brute Force
2020-08-16 06:27:28
222.186.175.151 attackbots
detected by Fail2Ban
2020-08-16 06:01:40
187.207.103.69 attack
Attempted connection to port 23.
2020-08-16 06:19:59
185.153.199.101 attackspam
Automatic report - Windows Brute-Force Attack
2020-08-16 06:32:05
46.70.133.225 attackspam
Attempted connection to port 445.
2020-08-16 06:09:16
110.49.70.240 attack
$f2bV_matches
2020-08-16 05:59:18
222.186.175.182 attack
Aug 15 22:27:37 email sshd\[4010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Aug 15 22:27:39 email sshd\[4010\]: Failed password for root from 222.186.175.182 port 24738 ssh2
Aug 15 22:27:51 email sshd\[4010\]: Failed password for root from 222.186.175.182 port 24738 ssh2
Aug 15 22:27:55 email sshd\[4064\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.182  user=root
Aug 15 22:27:57 email sshd\[4064\]: Failed password for root from 222.186.175.182 port 31692 ssh2
...
2020-08-16 06:29:08
138.197.21.218 attackbotsspam
Aug 15 23:18:17 ip106 sshd[9143]: Failed password for root from 138.197.21.218 port 35068 ssh2
...
2020-08-16 06:18:38
141.98.81.42 attack
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.42
Invalid user test from 141.98.81.42 port 35079
Failed password for invalid user test from 141.98.81.42 port 35079 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.42  user=root
Failed password for root from 141.98.81.42 port 35357 ssh2
2020-08-16 06:00:18
112.126.102.194 attackbots
Aug 15 23:51:51 piServer sshd[21899]: Failed password for root from 112.126.102.194 port 56642 ssh2
Aug 15 23:53:38 piServer sshd[22052]: Failed password for root from 112.126.102.194 port 40425 ssh2
...
2020-08-16 06:19:00

Recently Reported IPs

35.183.20.178 41.205.74.246 222.252.34.8 117.3.67.7
45.242.66.30 177.99.242.139 36.78.219.210 58.248.17.84
103.136.0.50 190.9.129.80 210.120.112.18 162.243.149.136
138.122.105.194 114.247.84.68 77.68.15.238 85.184.243.75
89.100.21.40 62.210.70.172 185.222.211.102 178.128.86.63