Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.234.148.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50416
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.234.148.135.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:20:36 CST 2025
;; MSG SIZE  rcvd: 108
Host info
b'Host 135.148.234.159.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 159.234.148.135.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
106.12.150.36 attackspambots
Repeated brute force against a port
2020-04-04 04:56:50
180.76.135.236 attack
Invalid user wangdc from 180.76.135.236 port 33488
2020-04-04 04:31:23
62.234.137.128 attackspam
Apr  3 22:35:27 tuxlinux sshd[48676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.137.128  user=root
Apr  3 22:35:29 tuxlinux sshd[48676]: Failed password for root from 62.234.137.128 port 52454 ssh2
Apr  3 22:35:27 tuxlinux sshd[48676]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.137.128  user=root
Apr  3 22:35:29 tuxlinux sshd[48676]: Failed password for root from 62.234.137.128 port 52454 ssh2
Apr  3 22:44:58 tuxlinux sshd[48959]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.137.128  user=root
...
2020-04-04 05:06:15
106.124.131.214 attackspam
fail2ban
2020-04-04 04:52:28
190.189.12.210 attackbotsspam
$f2bV_matches
2020-04-04 04:27:54
134.175.39.108 attack
(sshd) Failed SSH login from 134.175.39.108 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  3 22:13:34 elude sshd[13266]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.108  user=root
Apr  3 22:13:36 elude sshd[13266]: Failed password for root from 134.175.39.108 port 57356 ssh2
Apr  3 22:24:44 elude sshd[13772]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.108  user=root
Apr  3 22:24:47 elude sshd[13772]: Failed password for root from 134.175.39.108 port 56032 ssh2
Apr  3 22:31:09 elude sshd[14088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.39.108  user=root
2020-04-04 04:40:09
103.28.161.6 attackspam
Brute force attempt
2020-04-04 04:59:53
109.92.171.168 attackspam
Invalid user git from 109.92.171.168 port 51055
2020-04-04 04:51:28
187.190.236.88 attackspambots
5x Failed Password
2020-04-04 04:28:57
81.250.182.198 attackbots
Invalid user user from 81.250.182.198 port 48859
2020-04-04 05:04:22
125.91.32.157 attackspambots
Invalid user ouluchun from 125.91.32.157 port 35772
2020-04-04 04:41:46
120.70.97.233 attackbots
Invalid user xtz from 120.70.97.233 port 33528
2020-04-04 04:44:08
130.61.118.231 attackspambots
Apr  3 18:46:08 host5 sshd[25971]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=130.61.118.231  user=root
Apr  3 18:46:10 host5 sshd[25971]: Failed password for root from 130.61.118.231 port 42962 ssh2
...
2020-04-04 04:40:40
118.25.126.40 attackspambots
Invalid user qp from 118.25.126.40 port 38888
2020-04-04 04:45:53
180.76.60.144 attackspambots
Apr  3 16:01:52 NPSTNNYC01T sshd[9628]: Failed password for root from 180.76.60.144 port 38872 ssh2
Apr  3 16:04:47 NPSTNNYC01T sshd[9837]: Failed password for root from 180.76.60.144 port 58498 ssh2
...
2020-04-04 04:31:42

Recently Reported IPs

7.177.63.78 4.174.32.5 74.213.242.221 243.10.28.190
77.64.132.89 50.193.228.24 109.182.31.187 208.255.250.20
114.141.251.41 90.168.51.154 98.91.25.105 50.244.65.237
239.220.67.35 47.185.202.76 79.214.135.97 190.217.149.206
116.252.243.102 251.18.209.158 238.120.9.93 81.251.42.147