Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.72.113.201
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24721
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.72.113.201.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 03:33:16 CST 2025
;; MSG SIZE  rcvd: 107
Host info
201.113.72.148.in-addr.arpa domain name pointer 201.113.72.148.host.secureserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
201.113.72.148.in-addr.arpa	name = 201.113.72.148.host.secureserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
38.18.176.181 attackbots
DATE:2019-10-02 05:45:09, IP:38.18.176.181, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2019-10-02 19:23:44
114.34.157.39 attack
Telnet Server BruteForce Attack
2019-10-02 19:30:01
139.59.190.69 attackbotsspam
SSH Brute Force, server-1 sshd[5471]: Failed password for invalid user libuuid from 139.59.190.69 port 51831 ssh2
2019-10-02 19:40:59
204.17.56.42 attackbotsspam
Automatic report - Banned IP Access
2019-10-02 19:40:28
112.242.241.99 attackspambots
DATE:2019-10-02 05:44:38, IP:112.242.241.99, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2019-10-02 19:48:11
193.32.161.60 attack
firewall-block, port(s): 8888/tcp, 33333/tcp, 40000/tcp
2019-10-02 20:02:20
166.70.207.2 attackbots
2019-10-02T08:21:36.912024abusebot.cloudsearch.cf sshd\[14246\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=166.70.207.2  user=root
2019-10-02 19:32:30
171.229.111.12 attackspambots
Chat Spam
2019-10-02 19:59:50
183.111.227.5 attackbots
Oct  2 00:10:29 web9 sshd\[5321\]: Invalid user testftp from 183.111.227.5
Oct  2 00:10:29 web9 sshd\[5321\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.227.5
Oct  2 00:10:31 web9 sshd\[5321\]: Failed password for invalid user testftp from 183.111.227.5 port 57440 ssh2
Oct  2 00:16:35 web9 sshd\[6208\]: Invalid user jia from 183.111.227.5
Oct  2 00:16:35 web9 sshd\[6208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.227.5
2019-10-02 19:23:12
106.12.116.237 attackspam
Oct  2 15:54:09 areeb-Workstation sshd[23904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.116.237
Oct  2 15:54:11 areeb-Workstation sshd[23904]: Failed password for invalid user admin from 106.12.116.237 port 36974 ssh2
...
2019-10-02 19:48:36
45.80.65.76 attackbotsspam
2019-10-02T09:49:41.448000abusebot-5.cloudsearch.cf sshd\[15443\]: Invalid user 123qwe from 45.80.65.76 port 57528
2019-10-02 19:24:29
101.254.185.118 attack
Oct  2 05:44:40 lnxded64 sshd[5452]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.254.185.118
2019-10-02 19:51:14
173.239.37.139 attackbots
2019-10-02T13:06:14.603502tmaserv sshd\[15663\]: Invalid user pa from 173.239.37.139 port 36874
2019-10-02T13:06:14.608900tmaserv sshd\[15663\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.239.37.139
2019-10-02T13:06:16.516967tmaserv sshd\[15663\]: Failed password for invalid user pa from 173.239.37.139 port 36874 ssh2
2019-10-02T13:10:25.920858tmaserv sshd\[15805\]: Invalid user dino from 173.239.37.139 port 50532
2019-10-02T13:10:25.925377tmaserv sshd\[15805\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=173.239.37.139
2019-10-02T13:10:27.957979tmaserv sshd\[15805\]: Failed password for invalid user dino from 173.239.37.139 port 50532 ssh2
...
2019-10-02 19:37:46
129.211.80.201 attackbots
Oct  2 09:31:36 heissa sshd\[10385\]: Invalid user nina from 129.211.80.201 port 12285
Oct  2 09:31:36 heissa sshd\[10385\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.80.201
Oct  2 09:31:38 heissa sshd\[10385\]: Failed password for invalid user nina from 129.211.80.201 port 12285 ssh2
Oct  2 09:37:39 heissa sshd\[11263\]: Invalid user charles from 129.211.80.201 port 57191
Oct  2 09:37:39 heissa sshd\[11263\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.80.201
2019-10-02 19:26:39
45.227.255.223 attackbots
Automatic report - Port Scan
2019-10-02 19:45:25

Recently Reported IPs

73.40.29.196 221.193.10.3 244.108.1.204 39.179.117.32
23.97.255.152 136.94.54.14 231.188.183.189 121.143.29.254
18.240.63.249 7.239.59.204 84.130.71.170 147.96.243.185
77.46.200.95 229.27.243.210 9.117.153.204 139.156.200.244
123.254.68.139 60.115.225.156 193.39.213.7 115.111.48.133