Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: Vodafone Portugal - Communicacoes Pessoais S.A.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackspam
Unauthorized connection attempt detected from IP address 148.63.145.49 to port 8080
2020-01-14 18:30:48
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.63.145.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1738
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.63.145.49.			IN	A

;; AUTHORITY SECTION:
.			484	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011400 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 14 18:30:41 CST 2020
;; MSG SIZE  rcvd: 117
Host info
49.145.63.148.in-addr.arpa domain name pointer 49.145.63.148.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.145.63.148.in-addr.arpa	name = 49.145.63.148.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
141.98.81.38 attack
$f2bV_matches | Triggered by Fail2Ban at Vostok web server
2020-04-21 03:13:21
185.244.39.46 attackspam
Telnet Server BruteForce Attack
2020-04-21 02:58:15
192.228.100.222 attackbotsspam
Invalid user DUP from 192.228.100.222 port 46190
2020-04-21 02:53:05
167.172.154.50 attackspambots
Invalid user fake from 167.172.154.50 port 38974
2020-04-21 03:07:26
140.143.58.46 attack
Apr 20 17:52:56 124388 sshd[4980]: Failed password for root from 140.143.58.46 port 54356 ssh2
Apr 20 17:56:54 124388 sshd[5109]: Invalid user tester from 140.143.58.46 port 58196
Apr 20 17:56:54 124388 sshd[5109]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.58.46
Apr 20 17:56:54 124388 sshd[5109]: Invalid user tester from 140.143.58.46 port 58196
Apr 20 17:56:56 124388 sshd[5109]: Failed password for invalid user tester from 140.143.58.46 port 58196 ssh2
2020-04-21 03:14:14
171.99.191.210 attackspam
failed_logins
2020-04-21 03:07:04
192.210.192.165 attackbots
22 attempts against mh-ssh on echoip
2020-04-21 02:53:19
178.62.79.227 attack
Apr 20 16:15:57 prod4 sshd\[11818\]: Failed password for root from 178.62.79.227 port 59514 ssh2
Apr 20 16:22:24 prod4 sshd\[15030\]: Invalid user git from 178.62.79.227
Apr 20 16:22:26 prod4 sshd\[15030\]: Failed password for invalid user git from 178.62.79.227 port 44602 ssh2
...
2020-04-21 03:04:19
123.21.236.99 attack
Invalid user admin from 123.21.236.99 port 48698
2020-04-21 03:21:26
129.146.74.189 attackspambots
Apr 20 16:47:47 * sshd[5105]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.146.74.189
Apr 20 16:47:49 * sshd[5105]: Failed password for invalid user db from 129.146.74.189 port 45065 ssh2
2020-04-21 03:20:22
182.208.112.240 attack
Invalid user zo from 182.208.112.240 port 63278
2020-04-21 03:00:14
156.196.208.81 attackspambots
Invalid user admin from 156.196.208.81 port 48399
2020-04-21 03:10:53
140.249.30.232 attackspambots
Invalid user xk from 140.249.30.232 port 60000
2020-04-21 03:13:46
129.213.166.93 attackbots
Invalid user db2fenc1 from 129.213.166.93 port 52744
2020-04-21 03:17:50
183.47.14.74 attack
Invalid user et from 183.47.14.74 port 45166
2020-04-21 02:59:43

Recently Reported IPs

77.42.97.201 75.87.91.110 73.151.94.56 58.71.196.47
46.71.199.196 43.239.152.135 36.32.3.137 27.2.75.108
2.136.115.98 1.43.65.222 161.179.191.10 223.10.164.200
213.91.244.58 85.41.48.143 200.8.89.184 196.201.206.123
191.242.246.252 36.122.20.182 190.135.250.129 188.208.58.101