Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Antonio

Region: Texas

Country: United States

Internet Service Provider: PACE

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.62.22.141
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16228
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.62.22.141.			IN	A

;; AUTHORITY SECTION:
.			593	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019111700 1800 900 604800 86400

;; Query time: 59 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Nov 18 03:14:23 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 141.22.62.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 141.22.62.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
46.101.119.148 attack
Feb  3 00:29:20 pornomens sshd\[14222\]: Invalid user sshvpn from 46.101.119.148 port 48000
Feb  3 00:29:20 pornomens sshd\[14222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.119.148
Feb  3 00:29:22 pornomens sshd\[14222\]: Failed password for invalid user sshvpn from 46.101.119.148 port 48000 ssh2
...
2020-02-03 09:03:18
190.147.159.34 attackspambots
Invalid user paru from 190.147.159.34 port 55993
2020-02-03 08:53:07
94.23.1.181 attack
2020-02-02T23:29:31Z - RDP login failed multiple times. (94.23.1.181)
2020-02-03 08:56:12
201.16.246.71 attackspam
Feb  3 00:29:26 lnxded64 sshd[31996]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.16.246.71
2020-02-03 09:00:48
95.178.159.193 attack
Telnetd brute force attack detected by fail2ban
2020-02-03 09:11:21
13.232.146.139 attackspam
Unauthorized connection attempt detected from IP address 13.232.146.139 to port 2220 [J]
2020-02-03 09:01:38
179.190.112.179 attack
Unauthorized connection attempt detected from IP address 179.190.112.179 to port 2220 [J]
2020-02-03 09:15:12
206.189.142.10 attackbots
Feb  3 01:15:36 silence02 sshd[1636]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.142.10
Feb  3 01:15:39 silence02 sshd[1636]: Failed password for invalid user rongchein from 206.189.142.10 port 52032 ssh2
Feb  3 01:19:02 silence02 sshd[1930]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.142.10
2020-02-03 08:45:13
89.208.199.219 attackbots
Scanning unused Default website or suspicious access to valid sites from IP marked as abusive
2020-02-03 08:59:18
104.131.55.236 attackspambots
Feb  3 01:09:54 lnxmysql61 sshd[3602]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.131.55.236
2020-02-03 09:20:40
128.69.3.43 attack
Automatic report - Port Scan Attack
2020-02-03 09:13:46
209.105.168.91 attack
Unauthorized connection attempt detected from IP address 209.105.168.91 to port 2220 [J]
2020-02-03 09:06:44
106.12.95.20 attackspam
Feb  2 23:55:24 srv01 sshd[9403]: Invalid user system from 106.12.95.20 port 35124
Feb  2 23:55:24 srv01 sshd[9403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.95.20
Feb  2 23:55:24 srv01 sshd[9403]: Invalid user system from 106.12.95.20 port 35124
Feb  2 23:55:27 srv01 sshd[9403]: Failed password for invalid user system from 106.12.95.20 port 35124 ssh2
Feb  3 00:04:24 srv01 sshd[10091]: Invalid user sudyka from 106.12.95.20 port 48486


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.12.95.20
2020-02-03 09:24:13
218.92.0.189 attackbots
Feb  3 02:00:38 legacy sshd[28787]: Failed password for root from 218.92.0.189 port 51563 ssh2
Feb  3 02:00:41 legacy sshd[28787]: Failed password for root from 218.92.0.189 port 51563 ssh2
Feb  3 02:00:43 legacy sshd[28787]: Failed password for root from 218.92.0.189 port 51563 ssh2
...
2020-02-03 09:19:47
91.150.127.113 attackspam
SSH / Telnet Brute Force Attempts on Honeypot
2020-02-03 09:16:12

Recently Reported IPs

46.146.141.210 187.162.22.232 221.221.197.103 100.150.34.185
192.177.11.194 197.169.118.30 45.192.27.220 183.59.123.132
145.97.179.18 39.224.65.42 71.216.131.251 221.7.133.215
71.139.33.28 110.207.235.245 167.249.191.215 66.21.222.147
31.248.203.221 83.141.202.230 115.21.50.28 51.158.21.170