Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amman

Region: Amman Governorate

Country: Hashemite Kingdom of Jordan

Internet Service Provider: unknown

Hostname: unknown

Organization: Jordan Data Communications Company LLC

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
149.200.148.111 attackbotsspam
Automatic report - Port Scan Attack
2020-02-24 18:38:15
149.200.148.0 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-31 08:48:33
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.200.148.228
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15561
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;149.200.148.228.		IN	A

;; AUTHORITY SECTION:
.			2697	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019040501 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.3#53(67.207.67.3)
;; WHEN: Sat Apr 06 10:42:06 +08 2019
;; MSG SIZE  rcvd: 119

Host info
Host 228.148.200.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.3
Address:	67.207.67.3#53

** server can't find 228.148.200.149.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
218.25.161.226 attack
Brute force attack stopped by firewall
2020-07-16 08:21:11
186.96.193.72 attack
SASL PLAIN auth failed: ruser=...
2020-07-16 08:52:50
52.188.114.64 attack
$f2bV_matches
2020-07-16 08:20:46
191.53.238.104 attackspam
SASL PLAIN auth failed: ruser=...
2020-07-16 08:44:44
80.90.130.24 attackspam
SASL PLAIN auth failed: ruser=...
2020-07-16 08:35:04
187.63.35.223 attack
SASL PLAIN auth failed: ruser=...
2020-07-16 08:50:36
213.92.204.108 attackspam
failed_logins
2020-07-16 08:22:19
52.188.114.3 attack
1291. On Jul 15 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 52.188.114.3.
2020-07-16 08:38:33
91.237.239.41 attackspam
SASL PLAIN auth failed: ruser=...
2020-07-16 08:31:31
94.74.188.16 attackspam
SASL PLAIN auth failed: ruser=...
2020-07-16 08:19:00
122.51.254.201 attackbotsspam
Jul 16 00:24:41 ns392434 sshd[30934]: Invalid user soma from 122.51.254.201 port 52910
Jul 16 00:24:41 ns392434 sshd[30934]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.254.201
Jul 16 00:24:41 ns392434 sshd[30934]: Invalid user soma from 122.51.254.201 port 52910
Jul 16 00:24:42 ns392434 sshd[30934]: Failed password for invalid user soma from 122.51.254.201 port 52910 ssh2
Jul 16 00:28:08 ns392434 sshd[31013]: Invalid user NGED from 122.51.254.201 port 60800
Jul 16 00:28:08 ns392434 sshd[31013]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.254.201
Jul 16 00:28:08 ns392434 sshd[31013]: Invalid user NGED from 122.51.254.201 port 60800
Jul 16 00:28:10 ns392434 sshd[31013]: Failed password for invalid user NGED from 122.51.254.201 port 60800 ssh2
Jul 16 00:30:34 ns392434 sshd[31039]: Invalid user mike from 122.51.254.201 port 57598
2020-07-16 08:18:12
124.207.165.138 attackbots
Jul 16 00:06:02 vm1 sshd[18808]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.207.165.138
Jul 16 00:06:03 vm1 sshd[18808]: Failed password for invalid user ventura from 124.207.165.138 port 59770 ssh2
...
2020-07-16 08:29:32
46.151.73.63 attackbots
SASL PLAIN auth failed: ruser=...
2020-07-16 08:38:52
179.108.245.240 attack
SASL PLAIN auth failed: ruser=...
2020-07-16 08:55:58
95.143.137.208 attackbots
SASL PLAIN auth failed: ruser=...
2020-07-16 08:18:36

Recently Reported IPs

190.202.44.194 210.14.77.102 178.128.198.10 47.22.135.70
23.36.213.219 191.248.220.222 112.26.82.61 106.10.244.37
2.19.60.80 189.94.116.75 115.189.91.235 179.104.24.85
138.118.41.33 45.117.41.28 31.163.186.178 2.88.132.171
196.175.248.165 95.215.1.171 69.12.111.150 185.201.9.121