Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
148.63.242.31 attack
Repeated brute force against a port
2020-03-28 05:24:33
148.63.242.31 attackbots
$f2bV_matches
2020-03-23 16:51:34
148.63.242.31 attack
Mar 21 01:17:03 plusreed sshd[21910]: Invalid user hadoop from 148.63.242.31
...
2020-03-21 13:21:53
148.63.242.31 attackbots
Mar 17 21:18:58 mout sshd[23216]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.63.242.31  user=root
Mar 17 21:19:00 mout sshd[23216]: Failed password for root from 148.63.242.31 port 52429 ssh2
2020-03-18 04:41:16
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.63.242.105
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23142
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.63.242.105.			IN	A

;; AUTHORITY SECTION:
.			194	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024060200 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 03 01:08:16 CST 2024
;; MSG SIZE  rcvd: 107
Host info
105.242.63.148.in-addr.arpa domain name pointer 105.242.63.148.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
105.242.63.148.in-addr.arpa	name = 105.242.63.148.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
93.235.96.85 attackspambots
Port 22 Scan, PTR: None
2020-01-17 01:35:16
222.186.30.248 attackbotsspam
01/16/2020-12:08:10.415577 222.186.30.248 Protocol: 6 ET SCAN Potential SSH Scan
2020-01-17 01:15:56
171.240.18.190 attackbots
Unauthorized connection attempt detected from IP address 171.240.18.190 to port 445
2020-01-17 01:18:47
85.192.154.47 attackbots
Unauthorized connection attempt from IP address 85.192.154.47 on Port 445(SMB)
2020-01-17 01:32:13
106.53.33.77 attackbots
Jan 16 17:41:05 dedicated sshd[18798]: Invalid user admin from 106.53.33.77 port 59100
2020-01-17 01:11:43
185.176.27.122 attackspambots
01/16/2020-18:13:43.165294 185.176.27.122 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-01-17 01:14:30
106.208.123.28 attackspambots
Unauthorized connection attempt from IP address 106.208.123.28 on Port 445(SMB)
2020-01-17 01:30:18
197.210.153.46 attack
Unauthorized connection attempt from IP address 197.210.153.46 on Port 445(SMB)
2020-01-17 01:07:36
156.210.196.230 attackbots
Unauthorized connection attempt from IP address 156.210.196.230 on Port 445(SMB)
2020-01-17 01:02:38
187.167.68.31 attackbots
Unauthorized connection attempt from IP address 187.167.68.31 on Port 445(SMB)
2020-01-17 01:19:43
92.63.196.10 attackspambots
firewall-block, port(s): 33893/tcp, 33901/tcp, 33903/tcp, 33930/tcp, 33945/tcp, 33961/tcp, 33976/tcp, 33982/tcp, 33983/tcp, 33999/tcp
2020-01-17 01:23:02
45.173.224.22 attack
Unauthorized connection attempt from IP address 45.173.224.22 on Port 445(SMB)
2020-01-17 01:12:25
195.5.138.215 attack
Unauthorized connection attempt from IP address 195.5.138.215 on Port 445(SMB)
2020-01-17 00:56:52
222.186.31.144 attackspam
Jan 16 18:32:26 MK-Soft-VM6 sshd[17688]: Failed password for root from 222.186.31.144 port 11631 ssh2
Jan 16 18:32:30 MK-Soft-VM6 sshd[17688]: Failed password for root from 222.186.31.144 port 11631 ssh2
...
2020-01-17 01:34:26
102.177.109.224 attackbots
Automatic report - Port Scan Attack
2020-01-17 01:22:35

Recently Reported IPs

84.108.43.166 64.12.201.16 136.51.229.194 151.143.220.120
150.218.102.254 246.44.185.209 132.201.32.224 160.194.30.14
12.219.246.162 162.121.146.176 15.157.23.177 131.151.178.236
221.148.154.34 55.168.155.234 107.184.104.110 6.72.248.248
47.76.130.31 188.135.106.26 80.160.183.195 82.76.248.232