Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.72.93.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27627
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.72.93.215.			IN	A

;; AUTHORITY SECTION:
.			249	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:45:51 CST 2022
;; MSG SIZE  rcvd: 106
Host info
215.93.72.148.in-addr.arpa domain name pointer ip-148-72-93-215.ip.secureserver.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
215.93.72.148.in-addr.arpa	name = ip-148-72-93-215.ip.secureserver.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.161.95.15 attackspam
Unauthorized connection attempt from IP address 113.161.95.15 on Port 445(SMB)
2020-06-21 01:48:25
91.121.164.188 attackbotsspam
2020-06-20T17:50:59.500274homeassistant sshd[29355]: Invalid user alison from 91.121.164.188 port 43694
2020-06-20T17:50:59.509974homeassistant sshd[29355]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.121.164.188
...
2020-06-21 01:56:59
218.92.0.249 attackspambots
Jun 20 13:50:40 NPSTNNYC01T sshd[25360]: Failed password for root from 218.92.0.249 port 59102 ssh2
Jun 20 13:50:50 NPSTNNYC01T sshd[25360]: Failed password for root from 218.92.0.249 port 59102 ssh2
Jun 20 13:50:53 NPSTNNYC01T sshd[25360]: Failed password for root from 218.92.0.249 port 59102 ssh2
Jun 20 13:50:53 NPSTNNYC01T sshd[25360]: error: maximum authentication attempts exceeded for root from 218.92.0.249 port 59102 ssh2 [preauth]
...
2020-06-21 02:02:24
222.186.173.183 attack
Unauthorised connection attempt detected at AUO FR1 NODE2. System is sshd. Protected by AUO Stack Web Application Firewall (WAF)
2020-06-21 02:05:22
190.104.149.194 attackbotsspam
Jun 20 19:51:00 pve1 sshd[9912]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.104.149.194 
Jun 20 19:51:03 pve1 sshd[9912]: Failed password for invalid user integra from 190.104.149.194 port 55902 ssh2
...
2020-06-21 01:53:37
84.21.188.104 attackbotsspam
Registration form abuse
2020-06-21 01:43:37
139.162.115.221 attackspam
Port scan: Attack repeated for 24 hours
2020-06-21 01:31:26
118.123.245.76 attackbotsspam
06/20/2020-13:51:02.086550 118.123.245.76 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-21 01:54:23
188.163.8.59 attackbotsspam
Unauthorized connection attempt from IP address 188.163.8.59 on Port 445(SMB)
2020-06-21 01:38:07
177.105.60.118 attack
Jun 20 17:38:44 localhost sshd\[4429\]: Invalid user usuario from 177.105.60.118
Jun 20 17:38:44 localhost sshd\[4429\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.105.60.118
Jun 20 17:38:45 localhost sshd\[4429\]: Failed password for invalid user usuario from 177.105.60.118 port 65237 ssh2
Jun 20 17:46:34 localhost sshd\[4895\]: Invalid user tbl from 177.105.60.118
Jun 20 17:46:34 localhost sshd\[4895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.105.60.118
...
2020-06-21 01:38:28
45.148.10.221 attack
Jun 20 17:33:36 XXXXXX sshd[60900]: Invalid user admin from 45.148.10.221 port 53004
2020-06-21 02:02:08
40.117.41.106 attackspam
2020-06-20T18:46:07.651225vps773228.ovh.net sshd[29248]: Failed password for invalid user prova from 40.117.41.106 port 37459 ssh2
2020-06-20T18:52:15.387843vps773228.ovh.net sshd[29298]: Invalid user ros from 40.117.41.106 port 39046
2020-06-20T18:52:15.394467vps773228.ovh.net sshd[29298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.117.41.106
2020-06-20T18:52:15.387843vps773228.ovh.net sshd[29298]: Invalid user ros from 40.117.41.106 port 39046
2020-06-20T18:52:17.360893vps773228.ovh.net sshd[29298]: Failed password for invalid user ros from 40.117.41.106 port 39046 ssh2
...
2020-06-21 01:39:37
171.224.196.39 attackbotsspam
Unauthorized connection attempt from IP address 171.224.196.39 on Port 445(SMB)
2020-06-21 01:37:29
196.202.24.113 attackbotsspam
RDP brute force attack detected by fail2ban
2020-06-21 01:32:41
222.186.180.142 attack
Jun 20 20:05:55 mellenthin sshd[4482]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.142  user=root
Jun 20 20:05:57 mellenthin sshd[4482]: Failed password for invalid user root from 222.186.180.142 port 40542 ssh2
2020-06-21 02:09:46

Recently Reported IPs

148.72.93.247 148.72.93.242 148.72.93.249 148.72.94.17
148.72.96.22 148.72.97.183 148.72.94.64 148.72.93.43
148.72.94.43 148.72.97.195 148.76.101.114 148.72.98.248
148.76.101.140 148.72.95.91 148.74.49.141 148.76.181.3
148.78.93.26 148.77.67.96 148.78.93.25 148.78.84.203