Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.63.98.253
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57471
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.63.98.253.			IN	A

;; AUTHORITY SECTION:
.			547	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 10:31:20 CST 2022
;; MSG SIZE  rcvd: 106
Host info
253.98.63.148.in-addr.arpa domain name pointer 253.98.63.148.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
253.98.63.148.in-addr.arpa	name = 253.98.63.148.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
27.79.113.126 attackspambots
Telnet Server BruteForce Attack
2019-10-10 21:16:29
112.91.149.134 attack
Oct 10 14:58:47 sso sshd[32214]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.91.149.134
Oct 10 14:58:49 sso sshd[32214]: Failed password for invalid user Haslo!23 from 112.91.149.134 port 60074 ssh2
...
2019-10-10 21:47:03
134.209.64.10 attackbots
Oct 10 15:00:13 MK-Soft-VM6 sshd[28220]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.64.10 
Oct 10 15:00:15 MK-Soft-VM6 sshd[28220]: Failed password for invalid user Boutique2017 from 134.209.64.10 port 50670 ssh2
...
2019-10-10 21:54:12
92.119.160.142 attack
Oct 10 14:59:35 h2177944 kernel: \[3588432.428990\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.142 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=34762 PROTO=TCP SPT=44934 DPT=1705 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 10 15:17:45 h2177944 kernel: \[3589521.679137\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.142 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=50697 PROTO=TCP SPT=44934 DPT=3373 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 10 15:21:17 h2177944 kernel: \[3589733.638192\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.142 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=31316 PROTO=TCP SPT=44934 DPT=22223 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 10 15:24:42 h2177944 kernel: \[3589938.872403\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.142 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=248 ID=21480 PROTO=TCP SPT=44934 DPT=2104 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 10 15:28:53 h2177944 kernel: \[3590189.707087\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=92.119.160.142 DST=85.214
2019-10-10 21:45:47
5.10.100.238 attackbotsspam
10/10/2019-09:07:11.060755 5.10.100.238 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-10 21:19:40
42.99.180.135 attack
Oct 10 03:19:26 friendsofhawaii sshd\[8545\]: Invalid user RolandGarros from 42.99.180.135
Oct 10 03:19:26 friendsofhawaii sshd\[8545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.99.180.135
Oct 10 03:19:28 friendsofhawaii sshd\[8545\]: Failed password for invalid user RolandGarros from 42.99.180.135 port 55546 ssh2
Oct 10 03:23:39 friendsofhawaii sshd\[8906\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.99.180.135  user=root
Oct 10 03:23:42 friendsofhawaii sshd\[8906\]: Failed password for root from 42.99.180.135 port 37090 ssh2
2019-10-10 21:27:49
177.124.140.42 attackspam
2019-10-10T12:50:54.283122shield sshd\[2050\]: Invalid user ens from 177.124.140.42 port 45832
2019-10-10T12:50:54.290117shield sshd\[2050\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.140.42
2019-10-10T12:50:56.273328shield sshd\[2050\]: Failed password for invalid user ens from 177.124.140.42 port 45832 ssh2
2019-10-10T12:50:57.618948shield sshd\[2060\]: Invalid user ens from 177.124.140.42 port 46619
2019-10-10T12:50:57.624129shield sshd\[2060\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.124.140.42
2019-10-10 21:21:38
221.226.58.102 attackspam
Oct 10 13:07:46 localhost sshd\[130424\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.58.102  user=root
Oct 10 13:07:47 localhost sshd\[130424\]: Failed password for root from 221.226.58.102 port 39156 ssh2
Oct 10 13:12:23 localhost sshd\[130612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.58.102  user=root
Oct 10 13:12:24 localhost sshd\[130612\]: Failed password for root from 221.226.58.102 port 43608 ssh2
Oct 10 13:16:53 localhost sshd\[130749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.226.58.102  user=root
...
2019-10-10 21:34:40
178.128.223.243 attack
Oct 10 15:43:42 core sshd[22526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.223.243  user=root
Oct 10 15:43:44 core sshd[22526]: Failed password for root from 178.128.223.243 port 58884 ssh2
...
2019-10-10 21:46:10
200.108.139.242 attackspam
2019-10-10T13:02:33.925939abusebot-3.cloudsearch.cf sshd\[27255\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.108.139.242  user=root
2019-10-10 21:19:11
77.83.116.140 attack
2019-10-10T13:58:18.943241stark.klein-stark.info postfix/smtpd\[7642\]: NOQUEUE: reject: RCPT from wwe11.schol-methodicus.eu\[77.83.116.140\]: 554 5.7.1 \: Relay access denied\; from=\ to=\ proto=ESMTP helo=\
...
2019-10-10 21:33:49
159.65.109.148 attackspam
Automatic report - Banned IP Access
2019-10-10 21:49:15
221.162.255.86 attack
$f2bV_matches
2019-10-10 21:14:40
119.29.2.247 attackbotsspam
Oct 10 15:37:56 vps647732 sshd[5276]: Failed password for root from 119.29.2.247 port 45347 ssh2
...
2019-10-10 21:50:32
147.135.163.102 attackspambots
Oct 10 03:14:34 web9 sshd\[997\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.163.102  user=root
Oct 10 03:14:36 web9 sshd\[997\]: Failed password for root from 147.135.163.102 port 57514 ssh2
Oct 10 03:19:32 web9 sshd\[1757\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.163.102  user=root
Oct 10 03:19:33 web9 sshd\[1757\]: Failed password for root from 147.135.163.102 port 41206 ssh2
Oct 10 03:24:32 web9 sshd\[2382\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.163.102  user=root
2019-10-10 21:42:52

Recently Reported IPs

95.69.240.80 163.142.34.98 81.4.255.42 45.148.234.41
60.2.43.155 89.236.225.152 92.242.207.70 186.70.221.227
95.140.116.42 218.51.185.202 110.77.148.225 189.213.42.70
217.217.11.168 27.128.32.45 197.57.17.55 41.37.90.139
77.119.237.96 23.91.70.49 78.188.237.228 1.54.4.23