Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.8.29.164
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62952
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.8.29.164.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:40:40 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 164.29.8.148.in-addr.arpa. not found: 3(NXDOMAIN)
'
Nslookup info:
server can't find 148.8.29.164.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
83.25.46.56 attackbotsspam
"XSS Attack Detected via libinjection - Matched Data: XSS data found within ARGS_NAMES:
2020-07-20 18:22:33
106.12.89.206 attack
Jul 20 06:54:57 ArkNodeAT sshd\[18436\]: Invalid user enjoy from 106.12.89.206
Jul 20 06:54:57 ArkNodeAT sshd\[18436\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.89.206
Jul 20 06:54:59 ArkNodeAT sshd\[18436\]: Failed password for invalid user enjoy from 106.12.89.206 port 46896 ssh2
2020-07-20 18:11:13
101.89.210.67 attackbots
2020-07-20T12:11:29.705757afi-git.jinr.ru sshd[20823]: Failed password for admin from 101.89.210.67 port 34801 ssh2
2020-07-20T12:15:42.198282afi-git.jinr.ru sshd[21854]: Invalid user chungheon from 101.89.210.67 port 56908
2020-07-20T12:15:42.201486afi-git.jinr.ru sshd[21854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.89.210.67
2020-07-20T12:15:42.198282afi-git.jinr.ru sshd[21854]: Invalid user chungheon from 101.89.210.67 port 56908
2020-07-20T12:15:45.042814afi-git.jinr.ru sshd[21854]: Failed password for invalid user chungheon from 101.89.210.67 port 56908 ssh2
...
2020-07-20 18:15:48
187.190.236.88 attackspambots
Jul 20 08:33:07 *** sshd[18499]: Invalid user regina from 187.190.236.88
2020-07-20 18:22:02
212.129.16.53 attack
$f2bV_matches
2020-07-20 17:45:34
51.77.149.232 attackbots
SSH brutforce
2020-07-20 17:54:46
2a00:5ba0:10:2242:3c52:7dff:fee6:7714 attackbotsspam
Bad web bot already banned
2020-07-20 18:27:52
192.35.169.39 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-07-20 17:48:54
185.136.52.158 attack
Invalid user flores from 185.136.52.158 port 53308
2020-07-20 18:20:56
45.163.144.2 attackspam
Jul 20 10:36:01 vps639187 sshd\[18509\]: Invalid user projetecno from 45.163.144.2 port 44790
Jul 20 10:36:01 vps639187 sshd\[18509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.144.2
Jul 20 10:36:03 vps639187 sshd\[18509\]: Failed password for invalid user projetecno from 45.163.144.2 port 44790 ssh2
...
2020-07-20 18:07:58
200.17.114.215 attackspambots
Jul 20 08:25:21 XXX sshd[22779]: Invalid user mxy from 200.17.114.215 port 50050
2020-07-20 18:17:39
222.107.156.227 attackspambots
2020-07-20T03:48:08.268028abusebot.cloudsearch.cf sshd[16877]: Invalid user b from 222.107.156.227 port 49890
2020-07-20T03:48:08.273234abusebot.cloudsearch.cf sshd[16877]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.107.156.227
2020-07-20T03:48:08.268028abusebot.cloudsearch.cf sshd[16877]: Invalid user b from 222.107.156.227 port 49890
2020-07-20T03:48:10.630060abusebot.cloudsearch.cf sshd[16877]: Failed password for invalid user b from 222.107.156.227 port 49890 ssh2
2020-07-20T03:51:09.879081abusebot.cloudsearch.cf sshd[16979]: Invalid user atul from 222.107.156.227 port 16448
2020-07-20T03:51:09.883983abusebot.cloudsearch.cf sshd[16979]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.107.156.227
2020-07-20T03:51:09.879081abusebot.cloudsearch.cf sshd[16979]: Invalid user atul from 222.107.156.227 port 16448
2020-07-20T03:51:11.754173abusebot.cloudsearch.cf sshd[16979]: Failed password for in
...
2020-07-20 18:22:59
197.247.226.222 attack
Triggered by Fail2Ban at Ares web server
2020-07-20 17:52:03
182.61.185.92 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-07-20T08:38:08Z and 2020-07-20T09:23:51Z
2020-07-20 18:35:37
165.22.143.3 attackspam
TCP port : 5952
2020-07-20 18:31:11

Recently Reported IPs

203.183.88.211 196.104.87.180 60.155.179.130 93.174.97.253
218.131.123.71 72.57.33.180 202.128.63.104 76.151.16.135
152.67.40.144 167.162.31.38 141.49.247.34 214.250.226.163
2.103.94.219 53.113.59.65 174.111.46.220 249.152.120.248
153.213.232.221 243.167.19.250 60.255.100.81 228.173.175.131