Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Monterrey

Region: Nuevo León

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
148.245.13.21 attackspambots
Invalid user andy from 148.245.13.21 port 46054
2020-10-04 07:10:02
148.245.13.21 attack
Invalid user andy from 148.245.13.21 port 46054
2020-10-03 23:24:10
148.245.13.21 attackspambots
$f2bV_matches
2020-10-03 15:08:03
148.245.13.21 attackspambots
$f2bV_matches
2020-08-23 01:51:37
148.245.13.21 attackspam
Repeated brute force against a port
2020-07-20 04:26:13
148.245.195.51 attackbotsspam
firewall-block, port(s): 445/tcp
2020-07-07 09:01:06
148.245.13.21 attackbotsspam
2020-06-29T02:28:39.566329devel sshd[8908]: Failed password for invalid user wch from 148.245.13.21 port 47118 ssh2
2020-06-29T02:38:40.690878devel sshd[9626]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21  user=root
2020-06-29T02:38:42.537193devel sshd[9626]: Failed password for root from 148.245.13.21 port 33048 ssh2
2020-06-29 16:07:05
148.245.13.21 attackbotsspam
2020-06-01T12:32:22.574738shield sshd\[957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21  user=root
2020-06-01T12:32:24.803853shield sshd\[957\]: Failed password for root from 148.245.13.21 port 34056 ssh2
2020-06-01T12:34:57.259983shield sshd\[1386\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21  user=root
2020-06-01T12:34:59.434639shield sshd\[1386\]: Failed password for root from 148.245.13.21 port 53244 ssh2
2020-06-01T12:37:35.410227shield sshd\[1829\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21  user=root
2020-06-02 00:10:33
148.245.13.21 attack
May  9 18:33:34 wbs sshd\[23443\]: Invalid user admin from 148.245.13.21
May  9 18:33:35 wbs sshd\[23443\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21
May  9 18:33:36 wbs sshd\[23443\]: Failed password for invalid user admin from 148.245.13.21 port 56214 ssh2
May  9 18:37:20 wbs sshd\[23815\]: Invalid user ellen from 148.245.13.21
May  9 18:37:20 wbs sshd\[23815\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21
2020-05-10 16:27:58
148.245.119.70 attackbotsspam
Unauthorized connection attempt from IP address 148.245.119.70 on Port 445(SMB)
2020-03-12 06:16:59
148.245.13.21 attack
2020-03-01T19:41:16.178942  sshd[1739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.245.13.21
2020-03-01T19:41:16.163940  sshd[1739]: Invalid user cpanelrrdtool from 148.245.13.21 port 48440
2020-03-01T19:41:17.890096  sshd[1739]: Failed password for invalid user cpanelrrdtool from 148.245.13.21 port 48440 ssh2
2020-03-01T22:47:01.347257  sshd[5755]: Invalid user mcserv from 148.245.13.21 port 45062
...
2020-03-02 06:04:25
148.245.13.21 attackbotsspam
Feb 28 06:27:01 Tower sshd[4793]: Connection from 148.245.13.21 port 59916 on 192.168.10.220 port 22 rdomain ""
Feb 28 06:27:02 Tower sshd[4793]: Invalid user svnuser from 148.245.13.21 port 59916
Feb 28 06:27:02 Tower sshd[4793]: error: Could not get shadow information for NOUSER
Feb 28 06:27:02 Tower sshd[4793]: Failed password for invalid user svnuser from 148.245.13.21 port 59916 ssh2
Feb 28 06:27:02 Tower sshd[4793]: Received disconnect from 148.245.13.21 port 59916:11: Bye Bye [preauth]
Feb 28 06:27:02 Tower sshd[4793]: Disconnected from invalid user svnuser 148.245.13.21 port 59916 [preauth]
2020-02-28 20:24:20
148.245.13.21 attackbotsspam
Automatic report BANNED IP
2020-02-25 10:17:14
148.245.128.102 attackspam
unauthorized connection attempt
2020-02-16 21:50:13
148.245.13.21 attackspambots
2020-02-07T11:19:53.424796-07:00 suse-nuc sshd[20866]: Invalid user hqs from 148.245.13.21 port 46540
...
2020-02-08 05:31:40
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.245.1.47
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42769
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.245.1.47.			IN	A

;; AUTHORITY SECTION:
.			543	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032301 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 24 06:07:54 CST 2020
;; MSG SIZE  rcvd: 116
Host info
47.1.245.148.in-addr.arpa domain name pointer na-1-47.static.avantel.net.mx.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
47.1.245.148.in-addr.arpa	name = na-1-47.static.avantel.net.mx.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
52.176.110.203 attackspam
Jun 29 14:39:51 lnxweb61 sshd[26166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.176.110.203
Jun 29 14:39:51 lnxweb61 sshd[26166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.176.110.203
2019-06-29 22:19:05
138.0.7.25 attackbotsspam
2019-06-29T08:32:06.685709abusebot-3.cloudsearch.cf sshd\[1764\]: Invalid user admin from 138.0.7.25 port 41088
2019-06-29 22:09:40
91.221.71.180 attack
Unauthorized connection attempt from IP address 91.221.71.180 on Port 445(SMB)
2019-06-29 21:51:33
196.202.74.18 attackbotsspam
Unauthorized connection attempt from IP address 196.202.74.18 on Port 445(SMB)
2019-06-29 22:01:56
89.248.162.168 attack
29.06.2019 14:08:04 Connection to port 1499 blocked by firewall
2019-06-29 22:20:29
103.255.122.10 attackbotsspam
Unauthorized connection attempt from IP address 103.255.122.10 on Port 445(SMB)
2019-06-29 21:54:54
114.231.137.150 attack
2019-06-29T10:10:05.205886 X postfix/smtpd[19557]: warning: unknown[114.231.137.150]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29T10:32:14.256172 X postfix/smtpd[22802]: warning: unknown[114.231.137.150]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29T10:32:33.465839 X postfix/smtpd[22806]: warning: unknown[114.231.137.150]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
2019-06-29 21:42:49
41.45.134.141 attackbots
Unauthorized connection attempt from IP address 41.45.134.141 on Port 445(SMB)
2019-06-29 21:44:24
103.48.193.61 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-06-29 22:16:10
177.87.68.92 attack
libpam_shield report: forced login attempt
2019-06-29 22:12:01
5.113.203.118 attackspam
Unauthorized connection attempt from IP address 5.113.203.118 on Port 445(SMB)
2019-06-29 21:53:55
116.107.88.139 attack
Unauthorized connection attempt from IP address 116.107.88.139 on Port 445(SMB)
2019-06-29 22:02:16
139.199.195.199 attackbots
Jun 29 11:14:10 * sshd[20147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.195.199
Jun 29 11:14:11 * sshd[20147]: Failed password for invalid user demo from 139.199.195.199 port 48680 ssh2
2019-06-29 22:18:12
183.82.246.220 attack
Unauthorized connection attempt from IP address 183.82.246.220 on Port 445(SMB)
2019-06-29 22:22:34
111.119.206.222 attackbots
Sent Mail to target address hacked/leaked from Planet3DNow.de
2019-06-29 21:45:24

Recently Reported IPs

86.220.88.67 37.84.209.246 152.32.102.134 188.39.237.233
110.175.194.39 51.75.122.213 128.231.240.64 217.207.169.59
98.129.163.184 45.147.197.41 182.132.204.133 188.68.255.197
68.149.95.200 113.247.51.28 14.170.216.67 74.226.179.64
110.58.203.83 38.110.166.58 155.208.118.69 3.13.192.202