Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 18.204.139.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51067
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;18.204.139.148.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102901 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 30 02:19:10 CST 2022
;; MSG SIZE  rcvd: 107
Host info
148.139.204.18.in-addr.arpa domain name pointer ec2-18-204-139-148.compute-1.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.139.204.18.in-addr.arpa	name = ec2-18-204-139-148.compute-1.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
101.95.29.150 attackbotsspam
Oct 26 07:04:38 lnxded64 sshd[32023]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.95.29.150
2019-10-26 13:57:10
106.38.62.126 attackbotsspam
Oct 26 07:15:13 vps691689 sshd[3430]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.38.62.126
Oct 26 07:15:15 vps691689 sshd[3430]: Failed password for invalid user asd from 106.38.62.126 port 46180 ssh2
Oct 26 07:19:45 vps691689 sshd[3470]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.38.62.126
...
2019-10-26 13:28:11
193.104.35.82 attackbots
\[Sat Oct 26 06:59:35.264683 2019\] \[php7:error\] \[pid 2020\] \[client 193.104.35.82:33860\] script '/var/www/michele/indexe.php' not found or unable to stat, referer: http://site.ru
...
2019-10-26 14:10:51
206.167.33.12 attackbotsspam
SSH bruteforce (Triggered fail2ban)
2019-10-26 14:11:47
58.252.108.38 attack
1433/tcp 1433/tcp
[2019-10-12/26]2pkt
2019-10-26 13:55:27
182.61.161.107 attackbots
Failed password for root from 182.61.161.107 port 40238 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.161.107  user=root
Failed password for root from 182.61.161.107 port 51474 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.161.107  user=root
Failed password for root from 182.61.161.107 port 34472 ssh2
2019-10-26 13:50:50
103.141.138.127 attackbotsspam
Oct 26 11:44:17 webhost01 sshd[28879]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.141.138.127
Oct 26 11:44:20 webhost01 sshd[28879]: Failed password for invalid user admin from 103.141.138.127 port 54117 ssh2
...
2019-10-26 13:42:58
94.50.246.220 attackspam
Chat Spam
2019-10-26 13:27:40
193.32.160.150 attack
Oct 26 07:11:56 relay postfix/smtpd\[17444\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\; from=\<2jirbev8xiz7q0@paffst.com\> to=\ proto=ESMTP helo=\<\[193.32.160.150\]\>
Oct 26 07:11:56 relay postfix/smtpd\[17444\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\; from=\<2jirbev8xiz7q0@paffst.com\> to=\ proto=ESMTP helo=\<\[193.32.160.150\]\>
Oct 26 07:11:56 relay postfix/smtpd\[17444\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\; from=\<2jirbev8xiz7q0@paffst.com\> to=\ proto=ESMTP helo=\<\[193.32.160.150\]\>
Oct 26 07:11:56 relay postfix/smtpd\[17444\]: NOQUEUE: reject: RCPT from unknown\[193.32.160.150\]: 554 5.7.1 \: Relay access denied\;
...
2019-10-26 13:57:44
192.144.140.20 attack
2019-10-26T12:01:45.545351enmeeting.mahidol.ac.th sshd\[18475\]: User root from 192.144.140.20 not allowed because not listed in AllowUsers
2019-10-26T12:01:45.666961enmeeting.mahidol.ac.th sshd\[18475\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.140.20  user=root
2019-10-26T12:01:47.394246enmeeting.mahidol.ac.th sshd\[18475\]: Failed password for invalid user root from 192.144.140.20 port 51044 ssh2
...
2019-10-26 13:40:42
91.225.200.240 attackbots
445/tcp 445/tcp 445/tcp...
[2019-08-28/10-26]5pkt,1pt.(tcp)
2019-10-26 13:53:15
188.166.31.205 attackbotsspam
Oct 26 03:51:39 anodpoucpklekan sshd[41479]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.166.31.205  user=root
Oct 26 03:51:41 anodpoucpklekan sshd[41479]: Failed password for root from 188.166.31.205 port 36675 ssh2
...
2019-10-26 13:50:17
192.227.210.138 attackbotsspam
Oct 25 18:44:39 kapalua sshd\[21632\]: Invalid user lindolfo from 192.227.210.138
Oct 25 18:44:39 kapalua sshd\[21632\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.210.138
Oct 25 18:44:42 kapalua sshd\[21632\]: Failed password for invalid user lindolfo from 192.227.210.138 port 56022 ssh2
Oct 25 18:48:18 kapalua sshd\[21958\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.227.210.138  user=root
Oct 25 18:48:19 kapalua sshd\[21958\]: Failed password for root from 192.227.210.138 port 37780 ssh2
2019-10-26 14:01:02
1.59.79.119 attack
Unauthorised access (Oct 26) SRC=1.59.79.119 LEN=40 TTL=49 ID=18192 TCP DPT=8080 WINDOW=12627 SYN
2019-10-26 13:59:11
51.38.37.128 attackbots
Invalid user vendas from 51.38.37.128 port 37926
2019-10-26 13:48:15

Recently Reported IPs

209.13.134.81 6.93.182.154 206.64.41.32 47.33.112.219
185.129.54.112 93.197.200.25 60.137.138.174 236.206.0.48
217.93.137.34 173.82.226.196 56.178.71.10 200.6.94.225
188.121.3.185 144.172.249.239 212.20.153.126 207.85.55.14
241.231.59.193 34.80.163.85 93.212.221.13 122.189.96.46