Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amherst

Region: Massachusetts

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: Five College Net, LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.85.192.215
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20937
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;148.85.192.215.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019051700 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Fri May 17 23:06:47 CST 2019
;; MSG SIZE  rcvd: 118

Host info
215.192.85.148.in-addr.arpa domain name pointer MORD-302-HLWY.net.amherst.edu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
215.192.85.148.in-addr.arpa	name = MORD-302-HLWY.net.amherst.edu.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
103.109.52.59 attack
Sep  3 12:35:04 mail postfix/postscreen[35926]: PREGREET 19 after 0.88 from [103.109.52.59]:37661: EHLO locopress.it

...
2019-09-04 07:53:07
157.157.87.22 attack
2019-09-03T23:47:40.540725abusebot-4.cloudsearch.cf sshd\[10865\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.157.87.22  user=root
2019-09-04 08:15:36
188.166.251.87 attackspam
Sep  3 13:57:00 hiderm sshd\[8252\]: Invalid user rose from 188.166.251.87
Sep  3 13:57:00 hiderm sshd\[8252\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.87
Sep  3 13:57:02 hiderm sshd\[8252\]: Failed password for invalid user rose from 188.166.251.87 port 53939 ssh2
Sep  3 14:02:11 hiderm sshd\[8705\]: Invalid user desliga from 188.166.251.87
Sep  3 14:02:11 hiderm sshd\[8705\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.251.87
2019-09-04 08:09:18
58.56.32.238 attackspam
Sep  3 13:47:05 hcbb sshd\[7802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.32.238  user=root
Sep  3 13:47:06 hcbb sshd\[7802\]: Failed password for root from 58.56.32.238 port 2153 ssh2
Sep  3 13:51:33 hcbb sshd\[8189\]: Invalid user secretariat from 58.56.32.238
Sep  3 13:51:33 hcbb sshd\[8189\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.32.238
Sep  3 13:51:34 hcbb sshd\[8189\]: Failed password for invalid user secretariat from 58.56.32.238 port 2154 ssh2
2019-09-04 08:05:39
61.161.236.202 attackspambots
Sep  3 21:59:31 lnxded64 sshd[23910]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.161.236.202
2019-09-04 07:51:32
211.35.76.241 attack
$f2bV_matches
2019-09-04 08:21:41
191.53.118.140 attack
failed_logins
2019-09-04 08:05:03
106.13.60.58 attackspambots
Sep  3 13:56:38 kapalua sshd\[5082\]: Invalid user test from 106.13.60.58
Sep  3 13:56:38 kapalua sshd\[5082\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.60.58
Sep  3 13:56:41 kapalua sshd\[5082\]: Failed password for invalid user test from 106.13.60.58 port 44322 ssh2
Sep  3 14:01:32 kapalua sshd\[5545\]: Invalid user wxl from 106.13.60.58
Sep  3 14:01:32 kapalua sshd\[5545\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.60.58
2019-09-04 08:14:40
187.188.90.141 attackbotsspam
Jun 29 00:29:34 Server10 sshd[15393]: Invalid user deploy from 187.188.90.141 port 45316
Jun 29 00:29:34 Server10 sshd[15393]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.90.141
Jun 29 00:29:37 Server10 sshd[15393]: Failed password for invalid user deploy from 187.188.90.141 port 45316 ssh2
Jun 29 00:31:27 Server10 sshd[17297]: Invalid user andreas from 187.188.90.141 port 38260
Jun 29 00:31:27 Server10 sshd[17297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=187.188.90.141
Jun 29 00:31:29 Server10 sshd[17297]: Failed password for invalid user andreas from 187.188.90.141 port 38260 ssh2
2019-09-04 07:57:09
75.87.52.203 attackspam
Sep  3 14:15:34 hanapaa sshd\[24841\]: Invalid user ftpuser from 75.87.52.203
Sep  3 14:15:34 hanapaa sshd\[24841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-75-87-52-203.sw.biz.rr.com
Sep  3 14:15:35 hanapaa sshd\[24841\]: Failed password for invalid user ftpuser from 75.87.52.203 port 49884 ssh2
Sep  3 14:20:06 hanapaa sshd\[25232\]: Invalid user miao from 75.87.52.203
Sep  3 14:20:06 hanapaa sshd\[25232\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=rrcs-75-87-52-203.sw.biz.rr.com
2019-09-04 08:23:09
193.112.58.149 attack
Sep  3 23:41:57 MK-Soft-VM5 sshd\[20274\]: Invalid user cam from 193.112.58.149 port 51972
Sep  3 23:41:57 MK-Soft-VM5 sshd\[20274\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.112.58.149
Sep  3 23:41:59 MK-Soft-VM5 sshd\[20274\]: Failed password for invalid user cam from 193.112.58.149 port 51972 ssh2
...
2019-09-04 07:50:08
183.13.12.188 attackbots
Sep  4 01:30:26 OPSO sshd\[12151\]: Invalid user gcs from 183.13.12.188 port 21550
Sep  4 01:30:26 OPSO sshd\[12151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.12.188
Sep  4 01:30:28 OPSO sshd\[12151\]: Failed password for invalid user gcs from 183.13.12.188 port 21550 ssh2
Sep  4 01:38:27 OPSO sshd\[13509\]: Invalid user visitation from 183.13.12.188 port 23980
Sep  4 01:38:27 OPSO sshd\[13509\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.13.12.188
2019-09-04 08:21:04
117.27.151.104 attackbots
frenzy
2019-09-04 08:07:41
103.253.212.79 attack
failed_logins
2019-09-04 07:57:43
78.26.174.213 attackspam
Sep  3 20:29:30 km20725 sshd\[16130\]: Invalid user user6 from 78.26.174.213Sep  3 20:29:32 km20725 sshd\[16130\]: Failed password for invalid user user6 from 78.26.174.213 port 60232 ssh2Sep  3 20:34:37 km20725 sshd\[16413\]: Invalid user wc from 78.26.174.213Sep  3 20:34:39 km20725 sshd\[16413\]: Failed password for invalid user wc from 78.26.174.213 port 51830 ssh2
...
2019-09-04 08:29:11

Recently Reported IPs

53.137.220.69 177.38.240.202 219.68.99.49 45.133.49.130
121.140.169.157 38.99.171.194 139.151.220.175 91.119.30.116
66.124.35.5 107.175.47.82 206.23.128.119 81.74.11.56
72.198.152.250 84.224.214.89 81.213.71.35 102.150.134.135
188.230.192.173 61.8.101.149 81.152.79.39 185.125.174.236