Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Edinburgh

Region: Scotland

Country: United Kingdom

Internet Service Provider: Vodafone UK

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
148.252.132.148 attackbotsspam
Lines containing failures of 148.252.132.148
Aug 16 14:02:51 keyhelp sshd[6002]: Invalid user garibaldi from 148.252.132.148 port 45757
Aug 16 14:02:51 keyhelp sshd[6002]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.252.132.148
Aug 16 14:02:53 keyhelp sshd[6002]: Failed password for invalid user garibaldi from 148.252.132.148 port 45757 ssh2
Aug 16 14:02:53 keyhelp sshd[6002]: Received disconnect from 148.252.132.148 port 45757:11: Bye Bye [preauth]
Aug 16 14:02:53 keyhelp sshd[6002]: Disconnected from invalid user garibaldi 148.252.132.148 port 45757 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=148.252.132.148
2020-08-17 00:21:47
148.252.132.48 attack
invalid login attempt (csserver)
2020-06-28 01:54:37
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.252.132.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52556
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.252.132.85.			IN	A

;; AUTHORITY SECTION:
.			472	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100602 1800 900 604800 86400

;; Query time: 29 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 08:19:06 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 85.132.252.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.132.252.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.95.55.88 attack
Sep 14 13:36:50 aat-srv002 sshd[22080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.95.55.88
Sep 14 13:36:52 aat-srv002 sshd[22080]: Failed password for invalid user pr from 192.95.55.88 port 20041 ssh2
Sep 14 13:41:22 aat-srv002 sshd[22222]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.95.55.88
Sep 14 13:41:24 aat-srv002 sshd[22222]: Failed password for invalid user gozone from 192.95.55.88 port 40498 ssh2
...
2019-09-15 08:59:14
195.16.41.171 attackspam
$f2bV_matches
2019-09-15 08:44:02
192.241.185.120 attackspam
Sep 15 01:49:13 lnxded63 sshd[14035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.241.185.120
2019-09-15 09:23:48
88.255.94.185 attack
Automatic report - Port Scan Attack
2019-09-15 09:23:25
41.216.186.89 attackbots
41.216.186.89 - - \[14/Sep/2019:20:13:20 +0200\] "\\x03" 400 226 "-" "-"
2019-09-15 08:47:54
220.180.239.104 attackspambots
Sep 14 19:28:47 aat-srv002 sshd[31609]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.180.239.104
Sep 14 19:28:49 aat-srv002 sshd[31609]: Failed password for invalid user delhi4 from 220.180.239.104 port 64815 ssh2
Sep 14 19:41:34 aat-srv002 sshd[31965]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.180.239.104
Sep 14 19:41:36 aat-srv002 sshd[31965]: Failed password for invalid user uploader from 220.180.239.104 port 40426 ssh2
...
2019-09-15 08:53:33
35.134.247.210 attackbotsspam
Sep 14 14:51:24 plusreed sshd[15236]: Invalid user windows from 35.134.247.210
...
2019-09-15 09:02:48
138.68.4.198 attack
Sep 15 03:11:27 vps647732 sshd[8338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.68.4.198
Sep 15 03:11:28 vps647732 sshd[8338]: Failed password for invalid user vb from 138.68.4.198 port 56646 ssh2
...
2019-09-15 09:12:53
49.247.132.79 attackspam
Sep 15 01:12:20 MK-Soft-VM6 sshd\[27109\]: Invalid user lab2 from 49.247.132.79 port 57932
Sep 15 01:12:20 MK-Soft-VM6 sshd\[27109\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.132.79
Sep 15 01:12:22 MK-Soft-VM6 sshd\[27109\]: Failed password for invalid user lab2 from 49.247.132.79 port 57932 ssh2
...
2019-09-15 09:15:09
1.179.185.50 attack
$f2bV_matches
2019-09-15 08:58:51
79.137.72.121 attackbots
Sep 15 02:47:53 lnxded64 sshd[3863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121
Sep 15 02:47:53 lnxded64 sshd[3863]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121
2019-09-15 09:11:32
133.167.95.236 attackbotsspam
Sep 15 03:01:00 lnxded63 sshd[21155]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.167.95.236
2019-09-15 09:03:17
118.68.170.172 attack
Sep 14 14:44:40 web9 sshd\[17854\]: Invalid user alberding from 118.68.170.172
Sep 14 14:44:40 web9 sshd\[17854\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.68.170.172
Sep 14 14:44:41 web9 sshd\[17854\]: Failed password for invalid user alberding from 118.68.170.172 port 53320 ssh2
Sep 14 14:49:14 web9 sshd\[18734\]: Invalid user fj from 118.68.170.172
Sep 14 14:49:14 web9 sshd\[18734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.68.170.172
2019-09-15 09:03:44
138.121.161.198 attackspam
Sep 14 10:37:54 lcdev sshd\[11567\]: Invalid user aDmin from 138.121.161.198
Sep 14 10:37:54 lcdev sshd\[11567\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.161.198
Sep 14 10:37:56 lcdev sshd\[11567\]: Failed password for invalid user aDmin from 138.121.161.198 port 57782 ssh2
Sep 14 10:42:42 lcdev sshd\[12047\]: Invalid user c_log from 138.121.161.198
Sep 14 10:42:42 lcdev sshd\[12047\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.121.161.198
2019-09-15 09:16:24
14.173.196.129 attackspam
Sep 14 18:13:52 marvibiene sshd[37876]: Invalid user admin from 14.173.196.129 port 58373
Sep 14 18:13:52 marvibiene sshd[37876]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.173.196.129
Sep 14 18:13:52 marvibiene sshd[37876]: Invalid user admin from 14.173.196.129 port 58373
Sep 14 18:13:54 marvibiene sshd[37876]: Failed password for invalid user admin from 14.173.196.129 port 58373 ssh2
...
2019-09-15 08:52:44

Recently Reported IPs

83.171.224.185 128.90.166.166 104.165.169.106 128.90.188.227
193.233.141.151 193.233.137.242 45.157.151.252 95.213.199.119
41.82.181.115 94.154.127.76 185.190.24.108 23.19.236.152
91.188.247.38 1.0.237.10 183.77.119.13 144.126.144.36
149.102.150.59 149.102.150.44 153.126.215.58 141.98.212.118