Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Santa Clara

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.232.139.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50274
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;165.232.139.148.		IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025043000 1800 900 604800 86400

;; Query time: 90 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 30 18:30:20 CST 2025
;; MSG SIZE  rcvd: 108
Host info
Host 148.139.232.165.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.139.232.165.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.180.9 attackspam
2019-10-13T20:25:11.648043abusebot.cloudsearch.cf sshd\[22992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
2019-10-14 04:29:57
67.43.2.61 attackspambots
Automatic report - XMLRPC Attack
2019-10-14 04:13:48
129.213.179.77 attackbots
Oct 14 01:46:49 areeb-Workstation sshd[5209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.179.77
Oct 14 01:46:51 areeb-Workstation sshd[5209]: Failed password for invalid user Centrum@123 from 129.213.179.77 port 15842 ssh2
...
2019-10-14 04:21:54
185.90.116.251 attackbots
3389BruteforceStormFW23
2019-10-14 04:40:05
5.196.7.123 attackbotsspam
Oct 13 21:48:59 vps sshd[31230]: Failed password for root from 5.196.7.123 port 43412 ssh2
Oct 13 22:13:21 vps sshd[32566]: Failed password for root from 5.196.7.123 port 37224 ssh2
...
2019-10-14 04:26:39
106.12.84.115 attackbots
Oct 13 10:30:37 wbs sshd\[21557\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.84.115  user=root
Oct 13 10:30:39 wbs sshd\[21557\]: Failed password for root from 106.12.84.115 port 39688 ssh2
Oct 13 10:35:30 wbs sshd\[21947\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.84.115  user=root
Oct 13 10:35:32 wbs sshd\[21947\]: Failed password for root from 106.12.84.115 port 50198 ssh2
Oct 13 10:40:28 wbs sshd\[22478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.84.115  user=root
2019-10-14 04:50:00
103.91.84.54 attack
Autoban   103.91.84.54 AUTH/CONNECT
2019-10-14 04:11:56
54.36.189.105 attackbotsspam
10/13/2019-22:16:53.059836 54.36.189.105 Protocol: 6 ET TOR Known Tor Exit Node Traffic group 74
2019-10-14 04:20:15
168.194.163.138 attack
Mar 13 17:06:41 yesfletchmain sshd\[6015\]: Invalid user ts3 from 168.194.163.138 port 6357
Mar 13 17:06:41 yesfletchmain sshd\[6015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.163.138
Mar 13 17:06:44 yesfletchmain sshd\[6015\]: Failed password for invalid user ts3 from 168.194.163.138 port 6357 ssh2
Mar 13 17:12:09 yesfletchmain sshd\[6267\]: Invalid user user from 168.194.163.138 port 43284
Mar 13 17:12:09 yesfletchmain sshd\[6267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.194.163.138
...
2019-10-14 04:47:43
77.108.72.102 attackspambots
Oct 13 10:09:15 friendsofhawaii sshd\[2348\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.108.72.102  user=root
Oct 13 10:09:17 friendsofhawaii sshd\[2348\]: Failed password for root from 77.108.72.102 port 59692 ssh2
Oct 13 10:13:06 friendsofhawaii sshd\[2657\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.108.72.102  user=root
Oct 13 10:13:08 friendsofhawaii sshd\[2657\]: Failed password for root from 77.108.72.102 port 42510 ssh2
Oct 13 10:16:46 friendsofhawaii sshd\[2969\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=77.108.72.102  user=root
2019-10-14 04:25:26
222.186.180.41 attackbots
10/13/2019-16:51:25.857431 222.186.180.41 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-14 04:52:24
200.220.132.92 attackspam
Port 1433 Scan
2019-10-14 04:14:44
192.227.252.28 attackbotsspam
2019-10-13T20:16:33.295264abusebot-4.cloudsearch.cf sshd\[20047\]: Invalid user 1q@W\#E from 192.227.252.28 port 34046
2019-10-14 04:38:12
222.186.173.201 attackspambots
Oct 13 22:26:51 dedicated sshd[31063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.201  user=root
Oct 13 22:26:53 dedicated sshd[31063]: Failed password for root from 222.186.173.201 port 37080 ssh2
2019-10-14 04:36:34
222.186.42.163 attackspambots
Oct 13 22:34:30 MK-Soft-Root1 sshd[4458]: Failed password for root from 222.186.42.163 port 16257 ssh2
Oct 13 22:34:32 MK-Soft-Root1 sshd[4458]: Failed password for root from 222.186.42.163 port 16257 ssh2
...
2019-10-14 04:37:06

Recently Reported IPs

20.65.193.121 192.168.43.189 205.210.31.132 135.119.108.144
177.183.207.179 103.136.220.238 14.221.96.163 125.40.131.120
197.77.83.123 57.31.118.39 43.128.156.124 119.237.241.252
131.11.253.155 117.4.125.159 159.196.224.97 191.215.4.209
229.230.89.250 123.108.119.139 123.108.119.210 34.253.7.93