Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: CSL Limited

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
148.66.49.45 attackbots
HTTP Phishing website, try to steal your mail account data if you type in your mail credentials . Still online.
Server Destination: Hong kong
2019-07-25 20:53:17
148.66.44.9 attackspambots
3389BruteforceFW22
2019-07-09 21:32:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.66.4.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1641
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.66.4.52.			IN	A

;; AUTHORITY SECTION:
.			533	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023060402 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 05 10:22:43 CST 2023
;; MSG SIZE  rcvd: 104
Host info
Host 52.4.66.148.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 52.4.66.148.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
13.94.56.225 attack
SSH Invalid Login
2020-07-14 05:51:43
212.95.137.19 attack
623. On Jul 13 2020 experienced a Brute Force SSH login attempt -> 38 unique times by 212.95.137.19.
2020-07-14 06:01:43
193.112.4.12 attackbots
leo_www
2020-07-14 05:56:07
162.247.74.202 attackspambots
Brute forcing RDP port 3389
2020-07-14 05:40:22
49.232.14.216 attackbots
prod11
...
2020-07-14 05:30:48
27.109.129.83 attack
Automatic report - Port Scan Attack
2020-07-14 05:52:58
89.218.234.226 attackspambots
Unauthorized connection attempt from IP address 89.218.234.226 on Port 445(SMB)
2020-07-14 05:32:29
188.166.23.215 attackbotsspam
Jul 13 17:26:08 ws12vmsma01 sshd[47330]: Invalid user jca from 188.166.23.215
Jul 13 17:26:10 ws12vmsma01 sshd[47330]: Failed password for invalid user jca from 188.166.23.215 port 53050 ssh2
Jul 13 17:30:21 ws12vmsma01 sshd[48013]: Invalid user bookings from 188.166.23.215
...
2020-07-14 05:28:06
152.250.245.182 attack
Jul 13 21:27:54 game-panel sshd[31833]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.250.245.182
Jul 13 21:27:56 game-panel sshd[31833]: Failed password for invalid user oleg from 152.250.245.182 port 37858 ssh2
Jul 13 21:35:01 game-panel sshd[32202]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.250.245.182
2020-07-14 05:38:08
82.193.140.161 attackspam
Unauthorized connection attempt from IP address 82.193.140.161 on Port 445(SMB)
2020-07-14 05:55:17
181.115.140.213 attackspambots
ssh intrusion attempt
2020-07-14 05:53:36
118.27.9.229 attackspambots
Jul 14 03:07:24 dhoomketu sshd[1495886]: Failed password for vmail from 118.27.9.229 port 48640 ssh2
Jul 14 03:10:42 dhoomketu sshd[1496023]: Invalid user postgres from 118.27.9.229 port 45260
Jul 14 03:10:42 dhoomketu sshd[1496023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.27.9.229 
Jul 14 03:10:42 dhoomketu sshd[1496023]: Invalid user postgres from 118.27.9.229 port 45260
Jul 14 03:10:44 dhoomketu sshd[1496023]: Failed password for invalid user postgres from 118.27.9.229 port 45260 ssh2
...
2020-07-14 05:56:53
167.172.178.216 attack
2020-07-13T21:41:05.062125shield sshd\[10488\]: Invalid user apex from 167.172.178.216 port 48076
2020-07-13T21:41:05.070429shield sshd\[10488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.178.216
2020-07-13T21:41:07.092629shield sshd\[10488\]: Failed password for invalid user apex from 167.172.178.216 port 48076 ssh2
2020-07-13T21:44:08.604548shield sshd\[11204\]: Invalid user ghost from 167.172.178.216 port 45310
2020-07-13T21:44:08.611157shield sshd\[11204\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.172.178.216
2020-07-14 05:52:03
187.188.240.7 attack
$f2bV_matches
2020-07-14 05:29:02
187.62.9.2 attackbots
Unauthorized connection attempt from IP address 187.62.9.2 on Port 445(SMB)
2020-07-14 05:29:37

Recently Reported IPs

65.148.28.4 103.199.185.155 103.199.187.105 103.199.187.138
103.199.187.153 126.47.194.192 103.199.187.174 103.199.187.194
103.199.187.200 38.55.59.156 132.250.173.245 136.30.81.105
70.185.27.139 150.129.136.37 212.35.204.208 166.52.164.185
60.29.38.177 10.132.3.209 170.106.12.15 100.92.126.7