Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Korea (the Republic of)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.149.112.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 1683
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.149.112.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030100 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 22:19:14 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 48.112.149.152.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.112.149.152.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
139.59.7.177 attack
Invalid user monkey from 139.59.7.177 port 35374
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.7.177
Failed password for invalid user monkey from 139.59.7.177 port 35374 ssh2
Invalid user admin from 139.59.7.177 port 36084
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.7.177
2020-06-19 22:31:10
209.61.151.234 attack
From: Elissa Roach 
Subject: Confirm your deposit (Required). In order to activate Your Account you need to confirm
your deposit! Click here>> Confirm Your Deposit Here
2020-06-19 22:44:06
122.155.223.58 attackbotsspam
2020-06-19T15:39:22.282399mail.standpoint.com.ua sshd[20390]: Invalid user ram from 122.155.223.58 port 50432
2020-06-19T15:39:22.284961mail.standpoint.com.ua sshd[20390]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.223.58
2020-06-19T15:39:22.282399mail.standpoint.com.ua sshd[20390]: Invalid user ram from 122.155.223.58 port 50432
2020-06-19T15:39:23.712060mail.standpoint.com.ua sshd[20390]: Failed password for invalid user ram from 122.155.223.58 port 50432 ssh2
2020-06-19T15:40:13.248528mail.standpoint.com.ua sshd[20562]: Invalid user shubham from 122.155.223.58 port 56264
...
2020-06-19 22:31:49
158.69.243.138 attackspam
Automated report (2020-06-19T20:16:38+08:00). Misbehaving bot detected at this address.
2020-06-19 22:30:50
49.88.112.113 attackspam
Jun 19 03:02:26 php1 sshd\[2511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
Jun 19 03:02:28 php1 sshd\[2511\]: Failed password for root from 49.88.112.113 port 40816 ssh2
Jun 19 03:02:30 php1 sshd\[2511\]: Failed password for root from 49.88.112.113 port 40816 ssh2
Jun 19 03:02:32 php1 sshd\[2511\]: Failed password for root from 49.88.112.113 port 40816 ssh2
Jun 19 03:03:30 php1 sshd\[2580\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.113  user=root
2020-06-19 22:48:31
129.211.185.246 attackspam
Jun 19 14:13:52 onepixel sshd[2874023]: Failed password for invalid user ew from 129.211.185.246 port 59832 ssh2
Jun 19 14:15:37 onepixel sshd[2874788]: Invalid user shantel from 129.211.185.246 port 52152
Jun 19 14:15:37 onepixel sshd[2874788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.185.246 
Jun 19 14:15:37 onepixel sshd[2874788]: Invalid user shantel from 129.211.185.246 port 52152
Jun 19 14:15:39 onepixel sshd[2874788]: Failed password for invalid user shantel from 129.211.185.246 port 52152 ssh2
2020-06-19 22:40:35
220.134.28.166 attack
2020-06-19T13:56:06.164327shield sshd\[27937\]: Invalid user webmaster from 220.134.28.166 port 54918
2020-06-19T13:56:06.168632shield sshd\[27937\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-134-28-166.hinet-ip.hinet.net
2020-06-19T13:56:07.649635shield sshd\[27937\]: Failed password for invalid user webmaster from 220.134.28.166 port 54918 ssh2
2020-06-19T13:59:59.775477shield sshd\[28776\]: Invalid user nodejs from 220.134.28.166 port 54722
2020-06-19T13:59:59.778394shield sshd\[28776\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=220-134-28-166.hinet-ip.hinet.net
2020-06-19 22:12:30
218.92.0.133 attackbots
Jun 19 11:41:51 firewall sshd[29365]: Failed password for root from 218.92.0.133 port 52863 ssh2
Jun 19 11:41:55 firewall sshd[29365]: Failed password for root from 218.92.0.133 port 52863 ssh2
Jun 19 11:41:59 firewall sshd[29365]: Failed password for root from 218.92.0.133 port 52863 ssh2
...
2020-06-19 22:45:04
176.65.114.96 attackbots
xmlrpc attack
2020-06-19 22:09:26
43.229.153.76 attackbots
Jun 19 16:32:26 abendstille sshd\[23139\]: Invalid user shen from 43.229.153.76
Jun 19 16:32:26 abendstille sshd\[23139\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.153.76
Jun 19 16:32:28 abendstille sshd\[23139\]: Failed password for invalid user shen from 43.229.153.76 port 44528 ssh2
Jun 19 16:35:00 abendstille sshd\[25723\]: Invalid user mmm from 43.229.153.76
Jun 19 16:35:00 abendstille sshd\[25723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=43.229.153.76
...
2020-06-19 22:39:19
176.67.81.9 attackbots
[2020-06-19 10:13:54] NOTICE[1273] chan_sip.c: Registration from '' failed for '176.67.81.9:53094' - Wrong password
[2020-06-19 10:13:54] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-19T10:13:54.241-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="370",SessionID="0x7f31c0334138",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/176.67.81.9/53094",Challenge="7dd825a4",ReceivedChallenge="7dd825a4",ReceivedHash="64bdd42b815cac4bfdda3d7d65b0f464"
[2020-06-19 10:15:10] NOTICE[1273] chan_sip.c: Registration from '' failed for '176.67.81.9:64736' - Wrong password
[2020-06-19 10:15:10] SECURITY[1288] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-06-19T10:15:10.701-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="716",SessionID="0x7f31c018ea98",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/176.67.81.9/64736",Chal
...
2020-06-19 22:17:46
165.227.101.226 attackspam
Jun 19 15:28:16 cdc sshd[17980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.101.226 
Jun 19 15:28:18 cdc sshd[17980]: Failed password for invalid user stserver from 165.227.101.226 port 40098 ssh2
2020-06-19 22:30:26
49.235.11.46 attackspambots
Jun 19 15:41:44 abendstille sshd\[2165\]: Invalid user frank from 49.235.11.46
Jun 19 15:41:44 abendstille sshd\[2165\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.11.46
Jun 19 15:41:45 abendstille sshd\[2165\]: Failed password for invalid user frank from 49.235.11.46 port 49196 ssh2
Jun 19 15:48:41 abendstille sshd\[9336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.11.46  user=root
Jun 19 15:48:43 abendstille sshd\[9336\]: Failed password for root from 49.235.11.46 port 40296 ssh2
...
2020-06-19 22:07:42
45.55.222.162 attackspambots
Jun 19 22:13:05 web1 sshd[31859]: Invalid user user from 45.55.222.162 port 44072
Jun 19 22:13:05 web1 sshd[31859]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.222.162
Jun 19 22:13:05 web1 sshd[31859]: Invalid user user from 45.55.222.162 port 44072
Jun 19 22:13:07 web1 sshd[31859]: Failed password for invalid user user from 45.55.222.162 port 44072 ssh2
Jun 19 22:28:04 web1 sshd[3156]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.222.162  user=root
Jun 19 22:28:06 web1 sshd[3156]: Failed password for root from 45.55.222.162 port 56354 ssh2
Jun 19 22:31:04 web1 sshd[3983]: Invalid user service from 45.55.222.162 port 57184
Jun 19 22:31:04 web1 sshd[3983]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.222.162
Jun 19 22:31:04 web1 sshd[3983]: Invalid user service from 45.55.222.162 port 57184
Jun 19 22:31:06 web1 sshd[3983]: Failed password fo
...
2020-06-19 22:47:34
46.38.150.190 attackbotsspam
2020-06-19 15:26:59 dovecot_login authenticator failed for \(User\) \[46.38.150.190\]: 535 Incorrect authentication data \(set_id=mypc@no-server.de\)
2020-06-19 15:27:00 dovecot_login authenticator failed for \(User\) \[46.38.150.190\]: 535 Incorrect authentication data \(set_id=mypc@no-server.de\)
2020-06-19 15:27:10 dovecot_login authenticator failed for \(User\) \[46.38.150.190\]: 535 Incorrect authentication data \(set_id=rw@no-server.de\)
2020-06-19 15:27:10 dovecot_login authenticator failed for \(User\) \[46.38.150.190\]: 535 Incorrect authentication data \(set_id=rw@no-server.de\)
2020-06-19 15:27:30 dovecot_login authenticator failed for \(User\) \[46.38.150.190\]: 535 Incorrect authentication data \(set_id=rw@no-server.de\)
2020-06-19 15:27:31 dovecot_login authenticator failed for \(User\) \[46.38.150.190\]: 535 Incorrect authentication data \(set_id=rw@no-server.de\)
2020-06-19 15:27:41 dovecot_login authenticator failed for \(User\) \[46.38.150.190\]: 535 Incorrect authent
...
2020-06-19 22:08:13

Recently Reported IPs

240.5.117.42 207.85.65.177 222.212.49.21 34.234.17.188
142.60.179.133 131.215.10.22 23.207.94.18 84.123.75.176
4.118.25.196 208.211.52.6 97.201.199.174 166.60.59.102
247.166.139.236 19.81.184.209 48.224.149.68 222.227.227.254
48.150.19.163 108.41.11.200 32.192.56.24 103.58.213.18