Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 162.12.107.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15994
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;162.12.107.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 34 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 06:25:30 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 148.107.12.162.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.107.12.162.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
116.53.69.9 attackspam
445/tcp 445/tcp 445/tcp...
[2019-07-04/09-03]8pkt,1pt.(tcp)
2019-09-04 11:16:00
118.68.43.204 attack
Unauthorized connection attempt from IP address 118.68.43.204 on Port 445(SMB)
2019-09-04 11:27:07
35.187.52.165 attackbotsspam
Sep  4 04:41:24 dedicated sshd[23714]: Invalid user wa from 35.187.52.165 port 60012
2019-09-04 11:01:53
128.199.242.144 attack
DirectAdmin Block
2019-09-04 10:43:52
103.221.252.46 attackbots
Sep  4 02:33:05 MK-Soft-Root2 sshd\[18174\]: Invalid user testftp from 103.221.252.46 port 47504
Sep  4 02:33:05 MK-Soft-Root2 sshd\[18174\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.221.252.46
Sep  4 02:33:07 MK-Soft-Root2 sshd\[18174\]: Failed password for invalid user testftp from 103.221.252.46 port 47504 ssh2
...
2019-09-04 10:49:24
77.247.181.162 attack
Automated report - ssh fail2ban:
Sep 4 04:47:37 wrong password, user=root, port=43742, ssh2
Sep 4 04:47:41 wrong password, user=root, port=43742, ssh2
Sep 4 04:47:45 wrong password, user=root, port=43742, ssh2
Sep 4 04:47:49 wrong password, user=root, port=43742, ssh2
2019-09-04 10:50:17
122.195.200.148 attackbotsspam
Sep  3 17:30:05 tdfoods sshd\[26181\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148  user=root
Sep  3 17:30:06 tdfoods sshd\[26181\]: Failed password for root from 122.195.200.148 port 12496 ssh2
Sep  3 17:30:09 tdfoods sshd\[26181\]: Failed password for root from 122.195.200.148 port 12496 ssh2
Sep  3 17:30:12 tdfoods sshd\[26181\]: Failed password for root from 122.195.200.148 port 12496 ssh2
Sep  3 17:30:13 tdfoods sshd\[26207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.195.200.148  user=root
2019-09-04 11:32:54
5.89.64.166 attackspam
Sep  3 13:47:23 wbs sshd\[25917\]: Invalid user inma from 5.89.64.166
Sep  3 13:47:23 wbs sshd\[25917\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-64-166.cust.vodafonedsl.it
Sep  3 13:47:25 wbs sshd\[25917\]: Failed password for invalid user inma from 5.89.64.166 port 39976 ssh2
Sep  3 13:51:41 wbs sshd\[26316\]: Invalid user frank from 5.89.64.166
Sep  3 13:51:41 wbs sshd\[26316\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=net-5-89-64-166.cust.vodafonedsl.it
2019-09-04 11:16:42
212.129.38.146 attackbotsspam
Sep  3 10:48:40 php2 sshd\[22760\]: Invalid user test1 from 212.129.38.146
Sep  3 10:48:40 php2 sshd\[22760\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.38.146
Sep  3 10:48:42 php2 sshd\[22760\]: Failed password for invalid user test1 from 212.129.38.146 port 49972 ssh2
Sep  3 10:52:35 php2 sshd\[23161\]: Invalid user victoria from 212.129.38.146
Sep  3 10:52:35 php2 sshd\[23161\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.38.146
2019-09-04 11:25:05
5.15.133.6 attackspam
firewall-block, port(s): 60001/tcp
2019-09-04 11:33:48
189.89.216.104 attackspam
$f2bV_matches
2019-09-04 11:23:10
47.52.169.40 attackbotsspam
[portscan] Port scan
2019-09-04 10:44:40
180.76.242.171 attack
2019-09-04T02:36:22.656164abusebot-2.cloudsearch.cf sshd\[8987\]: Invalid user git from 180.76.242.171 port 34394
2019-09-04 11:04:56
196.43.165.47 attack
Sep  3 23:16:28 server sshd\[21938\]: Invalid user pichu from 196.43.165.47 port 42486
Sep  3 23:16:28 server sshd\[21938\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.165.47
Sep  3 23:16:30 server sshd\[21938\]: Failed password for invalid user pichu from 196.43.165.47 port 42486 ssh2
Sep  3 23:23:55 server sshd\[15020\]: Invalid user day from 196.43.165.47 port 55112
Sep  3 23:23:55 server sshd\[15020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.43.165.47
2019-09-04 10:53:58
178.128.87.28 attackspambots
$f2bV_matches
2019-09-04 11:20:37

Recently Reported IPs

16.106.10.234 52.109.128.177 233.184.76.187 104.102.171.71
241.18.65.167 198.139.1.114 127.145.220.43 83.137.214.3
55.112.36.15 186.121.152.172 235.157.129.204 71.131.111.60
2.124.84.149 231.38.32.19 77.132.17.231 224.24.28.220
173.213.76.105 52.25.235.110 201.188.237.6 22.105.145.40