Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Latvia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.148.53.99
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29518
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;159.148.53.99.			IN	A

;; AUTHORITY SECTION:
.			483	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019103100 1800 900 604800 86400

;; Query time: 31 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Oct 31 15:52:25 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 99.53.148.159.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 99.53.148.159.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.253.70.209 attack
Invalid user admin from 182.253.70.209 port 53383
2020-06-18 06:25:06
61.255.9.14 attack
Invalid user admin from 61.255.9.14 port 42248
2020-06-18 06:33:02
103.120.175.97 attackbotsspam
16. On Jun 17 2020 experienced a Brute Force SSH login attempt -> 42 unique times by 103.120.175.97.
2020-06-18 06:11:36
201.219.50.254 attack
Jun 17 23:58:33 ns382633 sshd\[19620\]: Invalid user tmp from 201.219.50.254 port 59368
Jun 17 23:58:33 ns382633 sshd\[19620\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.219.50.254
Jun 17 23:58:35 ns382633 sshd\[19620\]: Failed password for invalid user tmp from 201.219.50.254 port 59368 ssh2
Jun 18 00:04:33 ns382633 sshd\[20841\]: Invalid user jeanne from 201.219.50.254 port 37088
Jun 18 00:04:33 ns382633 sshd\[20841\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.219.50.254
2020-06-18 06:22:01
181.46.137.107 attackbots
Lines containing failures of 181.46.137.107
Jun 17 22:19:35 admin sshd[11914]: Invalid user pi from 181.46.137.107 port 47875
Jun 17 22:19:35 admin sshd[11916]: Invalid user pi from 181.46.137.107 port 47810
Jun 17 22:19:35 admin sshd[11914]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.46.137.107 
Jun 17 22:19:35 admin sshd[11916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.46.137.107 
Jun 17 22:19:36 admin sshd[11914]: Failed password for invalid user pi from 181.46.137.107 port 47875 ssh2
Jun 17 22:19:36 admin sshd[11916]: Failed password for invalid user pi from 181.46.137.107 port 47810 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=181.46.137.107
2020-06-18 06:43:09
93.84.248.103 attack
Invalid user admin from 93.84.248.103 port 57777
2020-06-18 06:48:26
82.209.209.202 attack
SSH_scan
2020-06-18 06:50:16
63.250.33.231 attackbotsspam
Invalid user mji from 63.250.33.231 port 36776
2020-06-18 06:13:24
121.101.133.37 attackbotsspam
137. On Jun 17 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 121.101.133.37.
2020-06-18 06:46:27
52.183.62.45 attack
Jun 17 14:02:14 mail sshd\[22657\]: Invalid user apache from 52.183.62.45
...
2020-06-18 06:34:08
190.148.51.163 attackspam
Invalid user admin from 190.148.51.163 port 4043
2020-06-18 06:41:14
3.230.143.72 attackbotsspam
SASL PLAIN auth failed: ruser=...
2020-06-18 06:19:37
45.95.168.173 attack
Jun 17 03:22:53 : SSH login attempts with invalid user
2020-06-18 06:15:14
113.172.181.79 attack
Invalid user admin from 113.172.181.79 port 42107
2020-06-18 06:47:01
183.129.174.68 attack
SSH Invalid Login
2020-06-18 06:42:47

Recently Reported IPs

41.134.141.174 192.154.7.89 88.27.113.21 161.186.220.172
121.158.143.83 31.13.242.239 63.226.78.159 109.70.241.190
188.221.87.151 200.48.7.231 22.236.92.105 122.173.5.157
38.220.142.8 91.99.49.9 3.62.20.235 42.4.252.242
203.175.38.114 245.130.181.217 193.193.219.128 192.136.125.144