Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.240.5.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15779
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.240.5.52.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021300 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Feb 13 14:45:50 CST 2022
;; MSG SIZE  rcvd: 105
Host info
52.5.240.148.in-addr.arpa domain name pointer dial-148-240-5-52.zone-1.ip.static-ftth.axtel.net.mx.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
52.5.240.148.in-addr.arpa	name = dial-148-240-5-52.zone-1.ip.static-ftth.axtel.net.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
103.101.52.48 attackspambots
$f2bV_matches
2019-12-11 02:39:38
89.97.0.61 attack
Automatic report - Port Scan Attack
2019-12-11 02:35:19
123.195.99.9 attackbotsspam
Dec 10 08:29:44 web9 sshd\[21439\]: Invalid user communication from 123.195.99.9
Dec 10 08:29:44 web9 sshd\[21439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.195.99.9
Dec 10 08:29:45 web9 sshd\[21439\]: Failed password for invalid user communication from 123.195.99.9 port 43670 ssh2
Dec 10 08:36:12 web9 sshd\[22618\]: Invalid user ggggggggg from 123.195.99.9
Dec 10 08:36:12 web9 sshd\[22618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.195.99.9
2019-12-11 02:45:35
49.234.96.205 attackbots
Dec 10 19:12:05 markkoudstaal sshd[7460]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.205
Dec 10 19:12:07 markkoudstaal sshd[7460]: Failed password for invalid user gdm from 49.234.96.205 port 54128 ssh2
Dec 10 19:17:29 markkoudstaal sshd[8059]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.96.205
2019-12-11 02:30:06
165.22.224.31 attackspam
Dec 10 07:57:07 sachi sshd\[4032\]: Invalid user ts2 from 165.22.224.31
Dec 10 07:57:07 sachi sshd\[4032\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.224.31
Dec 10 07:57:09 sachi sshd\[4032\]: Failed password for invalid user ts2 from 165.22.224.31 port 47488 ssh2
Dec 10 08:02:27 sachi sshd\[4540\]: Invalid user cisco123321 from 165.22.224.31
Dec 10 08:02:27 sachi sshd\[4540\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.22.224.31
2019-12-11 02:15:56
116.239.106.193 attackbotsspam
Dec 10 19:17:14 wasp postfix/smtpd[15868]: warning: unknown[116.239.106.193]: SASL LOGIN authentication failed: authentication failure
Dec 10 19:17:15 wasp postfix/smtpd[15868]: warning: unknown[116.239.106.193]: SASL LOGIN authentication failed: authentication failure
Dec 10 19:17:16 wasp postfix/smtpd[15868]: warning: unknown[116.239.106.193]: SASL LOGIN authentication failed: authentication failure
Dec 10 19:17:18 wasp postfix/smtpd[15868]: warning: unknown[116.239.106.193]: SASL LOGIN authentication failed: authentication failure
Dec 10 19:17:19 wasp postfix/smtpd[15868]: warning: unknown[116.239.106.193]: SASL LOGIN authentication failed: authentication failure
Dec 10 19:17:20 wasp postfix/smtpd[15868]: warning: unknown[116.239.106.193]: SASL LOGIN authentication failed: authentication failure
Dec 10 19:17:21 wasp postfix/smtpd[15868]: warning: unknown[116.239.106.193]: SASL LOGIN authentication fa
...
2019-12-11 02:34:07
114.33.147.84 attack
Dec 10 19:11:15 MK-Soft-VM5 sshd[8222]: Failed password for root from 114.33.147.84 port 46032 ssh2
Dec 10 19:17:23 MK-Soft-VM5 sshd[8314]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.33.147.84 
...
2019-12-11 02:34:22
132.248.192.9 attackspam
Dec 10 19:11:30 MK-Soft-VM3 sshd[15295]: Failed password for root from 132.248.192.9 port 56746 ssh2
...
2019-12-11 02:40:36
212.63.104.106 attackspambots
" "
2019-12-11 02:15:41
109.207.159.168 attack
Dec 10 18:01:47 MK-Soft-VM5 sshd[7166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.207.159.168 
Dec 10 18:01:48 MK-Soft-VM5 sshd[7166]: Failed password for invalid user baets from 109.207.159.168 port 45908 ssh2
...
2019-12-11 02:12:29
14.232.245.27 attackspam
Dec 10 19:17:33 MK-Soft-Root1 sshd[2844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.232.245.27 
Dec 10 19:17:35 MK-Soft-Root1 sshd[2844]: Failed password for invalid user vision from 14.232.245.27 port 52214 ssh2
...
2019-12-11 02:22:30
89.248.160.178 attackbots
Dec 10 19:22:27 debian-2gb-vpn-nbg1-1 kernel: [373332.178315] [UFW BLOCK] IN=eth0 OUT= MAC=96:00:00:38:96:44:d2:74:7f:6e:37:e3:08:00 SRC=89.248.160.178 DST=78.46.192.101 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=62511 PROTO=TCP SPT=47713 DPT=3481 WINDOW=1024 RES=0x00 SYN URGP=0
2019-12-11 02:09:37
138.91.155.235 attackbots
Dec 10 19:17:28 MK-Soft-VM3 sshd[15620]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.91.155.235 
Dec 10 19:17:30 MK-Soft-VM3 sshd[15620]: Failed password for invalid user temasekit6 from 138.91.155.235 port 40000 ssh2
...
2019-12-11 02:27:34
139.219.5.139 attackspambots
Dec 10 19:17:36 amit sshd\[11399\]: Invalid user gdm from 139.219.5.139
Dec 10 19:17:36 amit sshd\[11399\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.219.5.139
Dec 10 19:17:37 amit sshd\[11399\]: Failed password for invalid user gdm from 139.219.5.139 port 1664 ssh2
...
2019-12-11 02:18:16
49.212.183.253 attackspambots
Invalid user georgy from 49.212.183.253 port 58388
2019-12-11 02:10:31

Recently Reported IPs

148.240.60.132 148.240.60.89 148.240.62.67 148.240.66.12
148.240.4.53 148.240.66.236 148.243.243.65 148.240.66.62
148.243.29.239 148.245.128.206 148.240.62.23 148.245.218.108
148.240.67.112 148.245.128.63 148.251.126.239 148.243.29.54
148.251.128.153 148.245.31.59 148.245.31.179 148.245.31.77