Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Mexico

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.245.52.140
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30069
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.245.52.140.			IN	A

;; AUTHORITY SECTION:
.			537	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 110 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:40:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
140.52.245.148.in-addr.arpa domain name pointer 148-245-52-140.static.axtel.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
140.52.245.148.in-addr.arpa	name = 148-245-52-140.static.axtel.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
175.24.72.167 attackspambots
...
2020-07-02 00:26:37
41.44.184.184 attackspambots
Unauthorized connection attempt from IP address 41.44.184.184 on Port 445(SMB)
2020-07-01 23:56:47
152.168.117.159 attackspambots
Jun 30 18:53:03 ajax sshd[9872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.168.117.159 
Jun 30 18:53:06 ajax sshd[9872]: Failed password for invalid user scheduler from 152.168.117.159 port 38616 ssh2
2020-07-01 23:55:39
46.185.114.1 attack
xmlrpc attack
2020-07-02 00:11:15
202.55.175.236 attackbots
Failed password for invalid user vito from 202.55.175.236 port 48518 ssh2
2020-07-01 23:38:29
51.77.212.235 attackspam
5x Failed Password
2020-07-02 00:03:03
110.36.226.6 attackspam
Unauthorized connection attempt from IP address 110.36.226.6 on Port 445(SMB)
2020-07-01 23:39:46
170.130.143.6 attackspam
170.130.143.6 has been banned for [spam]
...
2020-07-02 00:08:03
137.27.236.43 attackspambots
Jun 30 17:14:45 XXX sshd[61714]: Invalid user nagios from 137.27.236.43 port 58970
2020-07-02 00:08:48
120.133.1.16 attackspambots
Jun 30 21:20:42 rancher-0 sshd[61384]: Failed password for root from 120.133.1.16 port 41408 ssh2
Jun 30 21:38:47 rancher-0 sshd[61800]: Invalid user karma from 120.133.1.16 port 37136
...
2020-07-02 00:06:57
23.229.52.154 attack
 TCP (SYN) 23.229.52.154:43451 -> port 445, len 44
2020-07-01 23:57:12
157.230.112.34 attack
Multiple SSH authentication failures from 157.230.112.34
2020-07-01 23:27:02
117.6.132.15 attackbots
Port scan: Attack repeated for 24 hours
2020-07-02 00:17:06
123.207.99.189 attack
Jun 30 19:59:30 host sshd[23141]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.207.99.189  user=root
Jun 30 19:59:33 host sshd[23141]: Failed password for root from 123.207.99.189 port 55790 ssh2
...
2020-07-01 23:34:52
37.252.95.168 attack
Unauthorized connection attempt from IP address 37.252.95.168 on Port 445(SMB)
2020-07-01 23:44:54

Recently Reported IPs

148.251.0.230 148.240.90.200 148.251.1.29 148.244.38.76
148.251.10.7 148.251.10.177 148.251.105.188 148.251.109.235
148.251.113.114 148.251.10.178 148.251.109.238 148.251.116.165
148.251.116.166 148.251.116.174 148.251.116.171 148.251.116.172
148.251.12.142 148.251.116.74 148.251.119.209 148.251.117.66