Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Houston

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.55.116.146
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60267
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.55.116.146.			IN	A

;; AUTHORITY SECTION:
.			287	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022901 1800 900 604800 86400

;; Query time: 66 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Mar 01 08:59:54 CST 2020
;; MSG SIZE  rcvd: 118
Host info
146.116.55.148.in-addr.arpa has no PTR record
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
*** Can't find 146.116.55.148.in-addr.arpa.: No answer

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
36.79.251.93 attackspam
Unauthorized connection attempt from IP address 36.79.251.93 on Port 445(SMB)
2019-08-30 19:07:51
14.254.45.13 attackbotsspam
Unauthorized connection attempt from IP address 14.254.45.13 on Port 445(SMB)
2019-08-30 18:58:54
42.58.180.171 attackspambots
23/tcp
[2019-08-30]1pkt
2019-08-30 18:17:38
201.242.154.202 attackspam
Unauthorized connection attempt from IP address 201.242.154.202 on Port 445(SMB)
2019-08-30 19:01:13
188.165.18.213 attack
Aug 29 23:49:40 hanapaa sshd\[9291\]: Invalid user kong from 188.165.18.213
Aug 29 23:49:40 hanapaa sshd\[9291\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.18.213
Aug 29 23:49:42 hanapaa sshd\[9291\]: Failed password for invalid user kong from 188.165.18.213 port 50244 ssh2
Aug 29 23:53:41 hanapaa sshd\[9657\]: Invalid user nagios from 188.165.18.213
Aug 29 23:53:41 hanapaa sshd\[9657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.18.213
2019-08-30 18:04:19
106.12.7.75 attackbotsspam
Aug 30 11:39:57 mail sshd\[20949\]: Failed password for invalid user 123456 from 106.12.7.75 port 49522 ssh2
Aug 30 11:43:15 mail sshd\[21574\]: Invalid user iv from 106.12.7.75 port 51902
Aug 30 11:43:15 mail sshd\[21574\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.7.75
Aug 30 11:43:17 mail sshd\[21574\]: Failed password for invalid user iv from 106.12.7.75 port 51902 ssh2
Aug 30 11:46:42 mail sshd\[22131\]: Invalid user 123456 from 106.12.7.75 port 54266
2019-08-30 18:19:44
5.136.187.202 attackspam
Unauthorized connection attempt from IP address 5.136.187.202 on Port 445(SMB)
2019-08-30 18:52:48
148.71.186.43 attack
Aug 30 04:07:38 server1 sshd\[7634\]: Invalid user admin from 148.71.186.43
Aug 30 04:07:38 server1 sshd\[7634\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.71.186.43 
Aug 30 04:07:39 server1 sshd\[7634\]: Failed password for invalid user admin from 148.71.186.43 port 56804 ssh2
Aug 30 04:08:30 server1 sshd\[7925\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.71.186.43  user=root
Aug 30 04:08:32 server1 sshd\[7925\]: Failed password for root from 148.71.186.43 port 46082 ssh2
...
2019-08-30 18:26:16
177.152.172.129 attack
$f2bV_matches
2019-08-30 18:04:50
178.128.242.233 attackbotsspam
Aug 30 00:23:13 askasleikir sshd[5895]: Failed password for invalid user tomcat from 178.128.242.233 port 49094 ssh2
Aug 30 00:34:06 askasleikir sshd[6128]: Failed password for invalid user smart from 178.128.242.233 port 57354 ssh2
Aug 30 00:30:28 askasleikir sshd[6042]: Failed password for invalid user webmaster from 178.128.242.233 port 40372 ssh2
2019-08-30 17:56:24
91.206.15.246 attack
Aug 30 09:45:54 mail kernel: [2239970.217615] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=91.206.15.246 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=2468 PROTO=TCP SPT=52885 DPT=19964 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 30 09:46:32 mail kernel: [2240008.098483] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=91.206.15.246 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=48306 PROTO=TCP SPT=52885 DPT=5331 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 30 09:48:34 mail kernel: [2240130.542592] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=91.206.15.246 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=50928 PROTO=TCP SPT=52885 DPT=30280 WINDOW=1024 RES=0x00 SYN URGP=0 
Aug 30 09:50:24 mail kernel: [2240240.647582] [UFW BLOCK] IN=eth0 OUT= MAC=fa:16:3e:d3:64:42:4c:5e:0c:c9:30:5f:08:00 SRC=91.206.15.246 DST=185.101.93.72 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=976 PROTO=TCP SPT=52885 DPT=55110 WINDOW=1024 RES=0x00 SYN
2019-08-30 18:51:57
52.172.140.10 attackspam
2019-08-30T09:21:07.218351abusebot-3.cloudsearch.cf sshd\[9193\]: Invalid user taniac from 52.172.140.10 port 59016
2019-08-30 17:44:53
117.48.228.28 attackspambots
Aug 29 22:48:10 tdfoods sshd\[7442\]: Invalid user cubie from 117.48.228.28
Aug 29 22:48:10 tdfoods sshd\[7442\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.228.28
Aug 29 22:48:12 tdfoods sshd\[7442\]: Failed password for invalid user cubie from 117.48.228.28 port 38588 ssh2
Aug 29 22:52:13 tdfoods sshd\[7799\]: Invalid user emmet from 117.48.228.28
Aug 29 22:52:13 tdfoods sshd\[7799\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.48.228.28
2019-08-30 18:26:39
103.60.126.80 attackbotsspam
Aug 30 00:07:16 eddieflores sshd\[2713\]: Invalid user redhat from 103.60.126.80
Aug 30 00:07:16 eddieflores sshd\[2713\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.126.80
Aug 30 00:07:19 eddieflores sshd\[2713\]: Failed password for invalid user redhat from 103.60.126.80 port 36122 ssh2
Aug 30 00:12:15 eddieflores sshd\[3382\]: Invalid user ubuntu from 103.60.126.80
Aug 30 00:12:15 eddieflores sshd\[3382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.60.126.80
2019-08-30 18:24:50
182.61.18.254 attack
ssh failed login
2019-08-30 17:35:01

Recently Reported IPs

216.195.46.122 103.212.33.9 123.20.34.5 179.127.37.2
103.131.25.177 179.126.90.96 45.140.169.135 116.203.59.65
36.236.214.104 160.255.141.15 42.118.253.190 184.71.110.206
122.238.153.51 71.46.213.130 99.83.114.158 186.140.248.232
118.44.227.41 40.92.158.19 132.141.221.28 199.74.57.138