Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.52.115.246
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40062
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.52.115.246.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 08 19:03:29 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 246.115.52.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 246.115.52.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
64.227.2.2 attackbotsspam
CMS (WordPress or Joomla) login attempt.
2020-10-06 02:19:31
218.29.54.87 attackspambots
SSH login attempts.
2020-10-06 01:55:36
92.247.93.142 attack
Registration form abuse
2020-10-06 02:10:16
212.124.119.74 attackspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-10-06 02:30:45
49.234.100.188 attackspambots
SSH login attempts.
2020-10-06 02:29:49
90.150.81.2 attack
IP 90.150.81.2 attacked honeypot on port: 80 at 10/5/2020 10:11:48 AM
2020-10-06 01:53:51
122.51.64.115 attackspam
SSH login attempts.
2020-10-06 02:10:59
138.75.138.149 attackbotsspam
Listed on    zen-spamhaus also abuseat.org   / proto=6  .  srcport=55347  .  dstport=23 Telnet  .     (3507)
2020-10-06 02:08:01
82.44.77.7 attackspambots
Port scan on 1 port(s): 22
2020-10-06 02:03:47
95.38.200.214 attackspambots
Port probing on unauthorized port 8080
2020-10-06 02:15:53
116.55.245.26 attack
vps:pam-generic
2020-10-06 02:28:36
211.95.84.146 attackbots
Oct  5 10:43:19 ny01 sshd[19332]: Failed password for root from 211.95.84.146 port 44262 ssh2
Oct  5 10:47:53 ny01 sshd[19861]: Failed password for root from 211.95.84.146 port 42231 ssh2
2020-10-06 02:26:52
138.197.151.213 attackbotsspam
firewall-block, port(s): 32001/tcp
2020-10-06 02:18:47
222.186.31.166 attack
Oct 5 20:13:31 *host* sshd\[32045\]: User *user* from 222.186.31.166 not allowed because none of user's groups are listed in AllowGroups
2020-10-06 02:13:50
200.75.225.62 attack
Found on Block BinaryDefense  / proto=6  .  srcport=57160  .  dstport=445 SMB  .     (3504)
2020-10-06 02:23:03

Recently Reported IPs

16.100.40.21 251.13.220.223 30.149.253.68 50.114.189.116
84.49.48.90 46.97.68.103 61.242.215.96 148.230.152.182
250.88.31.233 138.254.183.135 64.4.19.59 241.144.66.1
181.90.252.249 217.178.68.174 97.7.244.82 204.198.247.55
55.211.185.201 145.176.91.195 46.79.176.16 185.38.61.248