Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       148.96.0.0 - 148.96.255.255
CIDR:           148.96.0.0/16
NetName:        GM-148-96-B
NetHandle:      NET-148-96-0-0-1
Parent:         NET148 (NET-148-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   General Motors LLC (GMED)
RegDate:        1991-04-12
Updated:        2021-12-14
Ref:            https://rdap.arin.net/registry/ip/148.96.0.0


OrgName:        General Motors LLC
OrgId:          GMED
Address:        200 Renaissance Center
City:           Detroit
StateProv:      MI
PostalCode:     48265
Country:        US
RegDate:        1990-11-16
Updated:        2024-11-25
Ref:            https://rdap.arin.net/registry/entity/GMED


OrgNOCHandle: GCNA-ARIN
OrgNOCName:   GM CNE - Network Architecture
OrgNOCPhone:  +1-248-392-5482 
OrgNOCEmail:  grp-usit.ddi@gm.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/GCNA-ARIN

OrgAbuseHandle: GCD2-ARIN
OrgAbuseName:   GM Cyber Defense
OrgAbusePhone:  +1-224-377-9633 
OrgAbuseEmail:  abuse@gm.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/GCD2-ARIN

OrgTechHandle: KARUP2-ARIN
OrgTechName:   Karuppannan, Venkatachalam 
OrgTechPhone:  +1-313-667-2256 
OrgTechEmail:  venkatachalam.karuppannan@gm.com
OrgTechRef:    https://rdap.arin.net/registry/entity/KARUP2-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.96.94.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38647
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.96.94.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026043002 1800 900 604800 86400

;; Query time: 9 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 01 03:26:03 CST 2026
;; MSG SIZE  rcvd: 105
Host info
Host 85.94.96.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 85.94.96.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.235.139.216 attackspambots
no
2020-01-02 01:44:44
222.186.190.2 attackspambots
Jan  1 18:48:54 ns381471 sshd[26267]: Failed password for root from 222.186.190.2 port 59020 ssh2
Jan  1 18:49:08 ns381471 sshd[26267]: error: maximum authentication attempts exceeded for root from 222.186.190.2 port 59020 ssh2 [preauth]
2020-01-02 01:49:48
129.28.165.178 attackspam
Jan  1 16:12:55 zeus sshd[30424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.165.178 
Jan  1 16:12:57 zeus sshd[30424]: Failed password for invalid user whisk from 129.28.165.178 port 46582 ssh2
Jan  1 16:14:50 zeus sshd[30476]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.28.165.178 
Jan  1 16:14:52 zeus sshd[30476]: Failed password for invalid user ytruth2 from 129.28.165.178 port 59348 ssh2
2020-01-02 01:59:59
116.86.166.93 attackbotsspam
Jan  1 15:50:27 tor-proxy-04 sshd\[7041\]: Invalid user pi from 116.86.166.93 port 42878
Jan  1 15:50:27 tor-proxy-04 sshd\[7042\]: Invalid user pi from 116.86.166.93 port 42884
Jan  1 15:50:27 tor-proxy-04 sshd\[7041\]: Connection closed by 116.86.166.93 port 42878 \[preauth\]
Jan  1 15:50:27 tor-proxy-04 sshd\[7042\]: Connection closed by 116.86.166.93 port 42884 \[preauth\]
...
2020-01-02 01:24:50
185.156.73.49 attackspam
Port scan: Attack repeated for 24 hours
2020-01-02 01:27:51
45.148.10.188 attack
SSH invalid-user multiple login try
2020-01-02 01:55:41
185.244.167.52 attack
Jan  1 05:13:32 web9 sshd\[32103\]: Invalid user ubuntu from 185.244.167.52
Jan  1 05:13:32 web9 sshd\[32103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.167.52
Jan  1 05:13:34 web9 sshd\[32103\]: Failed password for invalid user ubuntu from 185.244.167.52 port 56636 ssh2
Jan  1 05:14:54 web9 sshd\[32281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.244.167.52  user=root
Jan  1 05:14:57 web9 sshd\[32281\]: Failed password for root from 185.244.167.52 port 40422 ssh2
2020-01-02 01:27:34
177.73.248.35 attackbotsspam
Automatic report - Banned IP Access
2020-01-02 01:54:54
167.114.251.164 attackspam
Jan  1 14:50:03 sigma sshd\[15317\]: Invalid user berve from 167.114.251.164Jan  1 14:50:06 sigma sshd\[15317\]: Failed password for invalid user berve from 167.114.251.164 port 54393 ssh2
...
2020-01-02 01:44:01
95.91.74.11 attack
Automated report (2020-01-01T15:04:32+00:00). Misbehaving bot detected at this address.
2020-01-02 02:02:16
104.103.86.223 attackspam
firewall-block, port(s): 50853/tcp, 50875/tcp, 51013/tcp, 51072/tcp, 51733/tcp, 51865/tcp, 53799/tcp, 64977/tcp
2020-01-02 01:48:25
1.0.247.116 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 01-01-2020 14:50:09.
2020-01-02 01:37:44
193.32.163.9 attackbots
2020-01-01T18:37:55.187016+01:00 lumpi kernel: [3190184.915979] INPUT:DROP:SPAMHAUS_EDROP:IN=eth0 OUT= MAC=52:54:a2:01:a5:04:d2:74:7f:6e:37:e3:08:00 SRC=193.32.163.9 DST=78.46.199.189 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=36716 PROTO=TCP SPT=48704 DPT=9833 WINDOW=1024 RES=0x00 SYN URGP=0 
...
2020-01-02 01:41:45
132.145.173.64 attack
Jan  1 18:11:54 mout sshd[13317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.145.173.64  user=root
Jan  1 18:11:55 mout sshd[13317]: Failed password for root from 132.145.173.64 port 34150 ssh2
2020-01-02 01:53:03
82.146.46.189 attackspam
Jan  1 09:49:53 plusreed sshd[6422]: Invalid user ssh from 82.146.46.189
...
2020-01-02 01:50:26

Recently Reported IPs

207.130.115.71 115.133.247.67 34.130.124.113 28.157.39.147
2606:4700:10::6814:6338 2606:4700:10::ac43:2325 119.204.109.61 212.61.32.20
3.106.209.194 128.241.227.123 64.179.162.164 2606:4700:10::6816:2815
43.160.240.216 63.34.145.48 157.230.123.151 14.212.68.42
146.103.41.75 54.91.45.104 2606:4700:10::6814:6558 2606:4700:10::6814:6199