Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.69.0.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20930
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.69.0.239.			IN	A

;; AUTHORITY SECTION:
.			195	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011000 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 10 14:41:48 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 239.0.69.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 239.0.69.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
91.121.110.97 attackbots
Nov  3 10:15:08 server sshd\[19040\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns350624.ip-91-121-110.eu  user=root
Nov  3 10:15:10 server sshd\[19040\]: Failed password for root from 91.121.110.97 port 56872 ssh2
Nov  3 10:20:19 server sshd\[20353\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns350624.ip-91-121-110.eu  user=root
Nov  3 10:20:21 server sshd\[20353\]: Failed password for root from 91.121.110.97 port 47356 ssh2
Nov  3 10:23:51 server sshd\[20934\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns350624.ip-91-121-110.eu  user=root
...
2019-11-03 17:20:03
185.185.232.21 attackspam
Brute forcing RDP port 3389
2019-11-03 17:01:08
184.30.210.217 attack
11/03/2019-09:37:43.420604 184.30.210.217 Protocol: 6 SURICATA TLS invalid record/traffic
2019-11-03 16:53:51
146.88.240.4 attackbots
Scanning random ports - tries to find possible vulnerable services
2019-11-03 17:02:11
89.46.109.232 attackspambots
xmlrpc attack
2019-11-03 16:54:11
14.102.152.182 attack
445/tcp 445/tcp 445/tcp
[2019-11-03]3pkt
2019-11-03 17:03:14
106.12.91.102 attackspam
Nov  3 08:28:15 server sshd\[23183\]: Invalid user ng from 106.12.91.102
Nov  3 08:28:15 server sshd\[23183\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.91.102 
Nov  3 08:28:17 server sshd\[23183\]: Failed password for invalid user ng from 106.12.91.102 port 41472 ssh2
Nov  3 08:51:50 server sshd\[29952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.91.102  user=root
Nov  3 08:51:53 server sshd\[29952\]: Failed password for root from 106.12.91.102 port 52118 ssh2
...
2019-11-03 17:18:17
186.208.231.13 attackspambots
60001/tcp
[2019-11-03]1pkt
2019-11-03 16:59:31
122.114.206.25 attackspam
Nov  3 09:38:52 meumeu sshd[9211]: Failed password for root from 122.114.206.25 port 56846 ssh2
Nov  3 09:45:27 meumeu sshd[9952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.114.206.25 
Nov  3 09:45:29 meumeu sshd[9952]: Failed password for invalid user ubuntu from 122.114.206.25 port 35932 ssh2
...
2019-11-03 16:47:48
36.73.109.46 attackbots
445/tcp 445/tcp
[2019-11-01]2pkt
2019-11-03 16:48:54
213.59.144.39 attackspambots
Nov  3 08:48:52 thevastnessof sshd[792]: Failed password for root from 213.59.144.39 port 50258 ssh2
...
2019-11-03 17:03:03
112.220.85.26 attackspam
SSH Brute-Force reported by Fail2Ban
2019-11-03 16:49:08
125.93.228.204 attackbots
23/tcp
[2019-11-03]1pkt
2019-11-03 17:16:53
94.74.89.239 attackspambots
23/tcp
[2019-11-03]1pkt
2019-11-03 17:26:00
36.67.135.42 attackbots
$f2bV_matches
2019-11-03 16:59:08

Recently Reported IPs

220.212.249.244 192.179.197.241 233.131.133.127 69.167.21.13
129.54.165.82 168.86.37.151 174.234.42.133 118.69.68.223
155.171.99.152 203.238.96.202 252.185.7.238 156.229.95.96
103.28.71.166 103.99.3.205 241.174.126.4 126.49.203.25
205.254.96.168 155.230.71.130 184.148.113.114 178.68.236.107