Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.69.22.255
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36446
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.69.22.255.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 20:42:49 CST 2025
;; MSG SIZE  rcvd: 106
Host info
255.22.69.148.in-addr.arpa domain name pointer 255.22.69.148.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
255.22.69.148.in-addr.arpa	name = 255.22.69.148.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
216.196.93.90 attack
Brute forcing email accounts
2020-10-09 23:20:09
206.189.171.204 attack
Oct  9 11:32:29 dignus sshd[28055]: Failed password for root from 206.189.171.204 port 40248 ssh2
Oct  9 11:36:08 dignus sshd[28152]: Invalid user majordomo from 206.189.171.204 port 45948
Oct  9 11:36:08 dignus sshd[28152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.171.204
Oct  9 11:36:10 dignus sshd[28152]: Failed password for invalid user majordomo from 206.189.171.204 port 45948 ssh2
Oct  9 11:39:51 dignus sshd[28186]: Invalid user admin from 206.189.171.204 port 51684
...
2020-10-09 23:20:39
115.182.105.68 attackspam
Oct  9 16:23:40 host1 sshd[1691469]: Invalid user nelson from 115.182.105.68 port 49267
Oct  9 16:23:42 host1 sshd[1691469]: Failed password for invalid user nelson from 115.182.105.68 port 49267 ssh2
Oct  9 16:23:40 host1 sshd[1691469]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.182.105.68 
Oct  9 16:23:40 host1 sshd[1691469]: Invalid user nelson from 115.182.105.68 port 49267
Oct  9 16:23:42 host1 sshd[1691469]: Failed password for invalid user nelson from 115.182.105.68 port 49267 ssh2
...
2020-10-09 23:21:34
67.225.5.77 attackbots
Forbidden directory scan :: 2020/10/08 20:46:31 [error] 47022#47022: *195184 access forbidden by rule, client: 67.225.5.77, server: [censored_1], request: "HEAD /https://www.[censored_1]/ HTTP/1.1", host: "www.[censored_1]"
2020-10-09 23:05:53
149.56.15.136 attackspam
SSH login attempts brute force.
2020-10-09 23:25:59
36.78.248.27 attack
Unauthorized connection attempt from IP address 36.78.248.27 on Port 445(SMB)
2020-10-09 23:29:06
43.225.64.246 attackspam
[ssh] SSH attack
2020-10-09 23:30:45
203.195.175.47 attack
[N10.H2.VM2] Port Scanner Detected Blocked by UFW
2020-10-09 22:48:00
93.61.134.60 attack
Oct  9 09:53:59 prod4 sshd\[28051\]: Invalid user apache2 from 93.61.134.60
Oct  9 09:54:02 prod4 sshd\[28051\]: Failed password for invalid user apache2 from 93.61.134.60 port 45348 ssh2
Oct  9 09:58:28 prod4 sshd\[30048\]: Invalid user eric from 93.61.134.60
...
2020-10-09 23:35:25
200.159.63.179 attackbots
Oct  9 10:40:42 vps-51d81928 sshd[678438]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.159.63.179 
Oct  9 10:40:42 vps-51d81928 sshd[678438]: Invalid user admin from 200.159.63.179 port 55268
Oct  9 10:40:44 vps-51d81928 sshd[678438]: Failed password for invalid user admin from 200.159.63.179 port 55268 ssh2
Oct  9 10:42:39 vps-51d81928 sshd[678462]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.159.63.179  user=root
Oct  9 10:42:41 vps-51d81928 sshd[678462]: Failed password for root from 200.159.63.179 port 39861 ssh2
...
2020-10-09 23:18:56
94.23.211.60 attack
Brute Force
2020-10-09 22:47:22
201.20.42.129 attackspambots
Icarus honeypot on github
2020-10-09 23:06:10
114.141.150.60 attack
1433/tcp 1433/tcp
[2020-10-08]2pkt
2020-10-09 23:28:37
117.34.91.22 attackbots
Oct  8 21:12:21 mockhub sshd[865763]: Failed password for invalid user test from 117.34.91.22 port 64890 ssh2
Oct  8 21:16:11 mockhub sshd[865926]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.34.91.22  user=root
Oct  8 21:16:13 mockhub sshd[865926]: Failed password for root from 117.34.91.22 port 63876 ssh2
...
2020-10-09 22:48:25
185.234.219.228 attack
37 times SMTP brute-force
2020-10-09 23:00:44

Recently Reported IPs

82.97.202.160 107.125.233.117 51.113.67.108 66.242.117.153
23.32.5.253 20.79.198.121 49.244.14.41 190.184.225.7
117.33.218.145 246.45.0.191 211.194.43.235 96.136.119.75
127.164.170.248 169.72.36.186 177.121.222.83 108.64.126.159
136.16.175.201 72.136.126.27 68.4.54.251 160.95.46.71