Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
148.72.214.18 attackspam
Sep  2 05:59:51 mail sshd\[28407\]: Invalid user vpn from 148.72.214.18 port 50321
Sep  2 05:59:51 mail sshd\[28407\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
Sep  2 05:59:53 mail sshd\[28407\]: Failed password for invalid user vpn from 148.72.214.18 port 50321 ssh2
Sep  2 06:08:25 mail sshd\[29875\]: Invalid user biuro from 148.72.214.18 port 58953
Sep  2 06:08:25 mail sshd\[29875\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
2019-09-02 16:02:02
148.72.214.18 attackspam
Sep  1 21:40:58 lnxded64 sshd[1194]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
2019-09-02 05:02:09
148.72.214.18 attackspambots
Aug 29 08:50:55 MK-Soft-Root1 sshd\[15631\]: Invalid user odol from 148.72.214.18 port 40599
Aug 29 08:50:55 MK-Soft-Root1 sshd\[15631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
Aug 29 08:50:57 MK-Soft-Root1 sshd\[15631\]: Failed password for invalid user odol from 148.72.214.18 port 40599 ssh2
...
2019-08-29 14:55:27
148.72.214.18 attack
ssh failed login
2019-08-26 07:23:57
148.72.214.18 attackbots
Aug 22 00:48:49 hanapaa sshd\[25148\]: Invalid user admin from 148.72.214.18
Aug 22 00:48:49 hanapaa sshd\[25148\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-214-18.ip.secureserver.net
Aug 22 00:48:51 hanapaa sshd\[25148\]: Failed password for invalid user admin from 148.72.214.18 port 48893 ssh2
Aug 22 00:56:57 hanapaa sshd\[25919\]: Invalid user tester from 148.72.214.18
Aug 22 00:56:57 hanapaa sshd\[25919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-214-18.ip.secureserver.net
2019-08-22 19:06:09
148.72.214.18 attack
Aug 16 07:32:40 friendsofhawaii sshd\[30222\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-214-18.ip.secureserver.net  user=root
Aug 16 07:32:42 friendsofhawaii sshd\[30222\]: Failed password for root from 148.72.214.18 port 44754 ssh2
Aug 16 07:42:31 friendsofhawaii sshd\[31224\]: Invalid user imre from 148.72.214.18
Aug 16 07:42:31 friendsofhawaii sshd\[31224\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=ip-148-72-214-18.ip.secureserver.net
Aug 16 07:42:33 friendsofhawaii sshd\[31224\]: Failed password for invalid user imre from 148.72.214.18 port 40963 ssh2
2019-08-17 01:55:28
148.72.214.18 attackbots
Aug 11 21:17:42 vps691689 sshd[19097]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
Aug 11 21:17:43 vps691689 sshd[19097]: Failed password for invalid user anna from 148.72.214.18 port 49110 ssh2
...
2019-08-12 08:20:04
148.72.214.18 attackspambots
Aug 10 18:22:44 MK-Soft-Root1 sshd\[16828\]: Invalid user temp from 148.72.214.18 port 59334
Aug 10 18:22:44 MK-Soft-Root1 sshd\[16828\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
Aug 10 18:22:46 MK-Soft-Root1 sshd\[16828\]: Failed password for invalid user temp from 148.72.214.18 port 59334 ssh2
...
2019-08-11 03:36:15
148.72.214.18 attack
Aug 10 11:01:03 MK-Soft-Root1 sshd\[16522\]: Invalid user admin from 148.72.214.18 port 42447
Aug 10 11:01:03 MK-Soft-Root1 sshd\[16522\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
Aug 10 11:01:05 MK-Soft-Root1 sshd\[16522\]: Failed password for invalid user admin from 148.72.214.18 port 42447 ssh2
...
2019-08-10 17:26:19
148.72.214.18 attackspambots
SSH Brute Force
2019-08-07 12:55:47
148.72.214.18 attackspambots
Jul 29 20:31:39 tux-35-217 sshd\[25721\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18  user=root
Jul 29 20:31:41 tux-35-217 sshd\[25721\]: Failed password for root from 148.72.214.18 port 52011 ssh2
Jul 29 20:36:50 tux-35-217 sshd\[25731\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18  user=root
Jul 29 20:36:52 tux-35-217 sshd\[25731\]: Failed password for root from 148.72.214.18 port 49851 ssh2
...
2019-07-30 09:39:56
148.72.214.18 attack
Jul 26 09:07:53 vps200512 sshd\[26197\]: Invalid user doom from 148.72.214.18
Jul 26 09:07:53 vps200512 sshd\[26197\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
Jul 26 09:07:55 vps200512 sshd\[26197\]: Failed password for invalid user doom from 148.72.214.18 port 57094 ssh2
Jul 26 09:13:07 vps200512 sshd\[26410\]: Invalid user yeti from 148.72.214.18
Jul 26 09:13:07 vps200512 sshd\[26410\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
2019-07-26 21:15:16
148.72.214.18 attack
Jul 25 23:06:19 vps200512 sshd\[26055\]: Invalid user thomas from 148.72.214.18
Jul 25 23:06:19 vps200512 sshd\[26055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
Jul 25 23:06:20 vps200512 sshd\[26055\]: Failed password for invalid user thomas from 148.72.214.18 port 52675 ssh2
Jul 25 23:11:23 vps200512 sshd\[26273\]: Invalid user monit from 148.72.214.18
Jul 25 23:11:23 vps200512 sshd\[26273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
2019-07-26 11:19:33
148.72.214.18 attackspam
Jul 20 13:04:30 vps sshd[9112]: Failed password for root from 148.72.214.18 port 46272 ssh2
Jul 20 13:31:16 vps sshd[10085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18 
Jul 20 13:31:18 vps sshd[10085]: Failed password for invalid user designer from 148.72.214.18 port 60168 ssh2
...
2019-07-21 05:44:12
148.72.214.18 attack
Jul 16 05:11:57 localhost sshd\[21802\]: Invalid user install from 148.72.214.18 port 59164
Jul 16 05:11:57 localhost sshd\[21802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.72.214.18
Jul 16 05:11:59 localhost sshd\[21802\]: Failed password for invalid user install from 148.72.214.18 port 59164 ssh2
2019-07-16 11:24:03
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.72.214.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33094
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.72.214.225.			IN	A

;; AUTHORITY SECTION:
.			320	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:45:11 CST 2022
;; MSG SIZE  rcvd: 107
Host info
225.214.72.148.in-addr.arpa domain name pointer ip-148-72-214-225.ip.secureserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
225.214.72.148.in-addr.arpa	name = ip-148-72-214-225.ip.secureserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
34.94.143.250 attack
Port 22 Scan, PTR: None
2019-12-03 17:41:36
94.140.226.177 attackspam
Dec  3 15:00:18 gw1 sshd[15087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.140.226.177
Dec  3 15:00:19 gw1 sshd[15087]: Failed password for invalid user apache from 94.140.226.177 port 33508 ssh2
...
2019-12-03 18:02:31
167.99.196.237 attackbotsspam
Port 22 Scan, PTR: None
2019-12-03 17:29:12
152.249.245.68 attackspam
Dec  3 10:31:09 icinga sshd[21181]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.249.245.68
Dec  3 10:31:12 icinga sshd[21181]: Failed password for invalid user asterisk from 152.249.245.68 port 51926 ssh2
...
2019-12-03 17:45:00
178.128.81.125 attackspam
Dec  3 08:55:35 marvibiene sshd[18291]: Invalid user cron from 178.128.81.125 port 64963
Dec  3 08:55:35 marvibiene sshd[18291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.81.125
Dec  3 08:55:35 marvibiene sshd[18291]: Invalid user cron from 178.128.81.125 port 64963
Dec  3 08:55:37 marvibiene sshd[18291]: Failed password for invalid user cron from 178.128.81.125 port 64963 ssh2
...
2019-12-03 17:40:26
103.110.89.148 attackbotsspam
2019-12-03T09:08:36.656818abusebot-4.cloudsearch.cf sshd\[23167\]: Invalid user dimyat from 103.110.89.148 port 43502
2019-12-03 17:36:08
37.98.224.105 attackbotsspam
Dec  3 10:12:58 legacy sshd[10849]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.98.224.105
Dec  3 10:12:59 legacy sshd[10849]: Failed password for invalid user dajiangda from 37.98.224.105 port 59062 ssh2
Dec  3 10:20:07 legacy sshd[11154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.98.224.105
...
2019-12-03 17:35:38
198.108.67.95 attack
firewall-block, port(s): 2083/tcp
2019-12-03 17:42:38
185.216.132.15 attackspambots
$f2bV_matches
2019-12-03 18:03:24
220.129.97.148 attackspam
scan z
2019-12-03 17:54:17
84.45.251.243 attackspambots
Dec  3 10:45:05 ArkNodeAT sshd\[2179\]: Invalid user 123 from 84.45.251.243
Dec  3 10:45:05 ArkNodeAT sshd\[2179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=84.45.251.243
Dec  3 10:45:07 ArkNodeAT sshd\[2179\]: Failed password for invalid user 123 from 84.45.251.243 port 58384 ssh2
2019-12-03 17:57:23
222.186.175.151 attack
Dec  3 10:49:48 amit sshd\[1173\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
Dec  3 10:49:50 amit sshd\[1173\]: Failed password for root from 222.186.175.151 port 37540 ssh2
Dec  3 10:50:06 amit sshd\[1180\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.151  user=root
...
2019-12-03 17:58:55
51.91.48.22 attackbotsspam
Port 22 Scan, PTR: None
2019-12-03 17:40:13
150.109.170.73 attackspambots
" "
2019-12-03 18:00:36
139.199.80.67 attackbots
Dec  3 09:59:12 microserver sshd[13968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.80.67  user=root
Dec  3 09:59:13 microserver sshd[13968]: Failed password for root from 139.199.80.67 port 39416 ssh2
Dec  3 10:06:16 microserver sshd[15227]: Invalid user admin0 from 139.199.80.67 port 45856
Dec  3 10:06:16 microserver sshd[15227]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.80.67
Dec  3 10:06:18 microserver sshd[15227]: Failed password for invalid user admin0 from 139.199.80.67 port 45856 ssh2
Dec  3 10:20:11 microserver sshd[17353]: Invalid user przybycien from 139.199.80.67 port 58734
Dec  3 10:20:11 microserver sshd[17353]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.80.67
Dec  3 10:20:13 microserver sshd[17353]: Failed password for invalid user przybycien from 139.199.80.67 port 58734 ssh2
Dec  3 10:26:35 microserver sshd[18233]: Invalid user host fr
2019-12-03 17:38:13

Recently Reported IPs

148.72.217.56 148.72.218.106 148.72.218.129 148.72.218.62
148.72.22.102 148.72.218.184 148.72.219.64 148.72.22.223
148.72.219.162 148.72.22.240 148.72.22.16 148.72.22.251
148.72.232.161 148.72.22.150 148.72.232.54 148.72.239.241
148.72.24.138 148.72.239.5 148.72.24.205 148.72.245.130