Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT Telkom Indonesia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
Unauthorized connection attempt detected from IP address 180.246.148.150 to port 445
2019-12-31 18:10:10
Comments on same subnet:
IP Type Details Datetime
180.246.148.212 attackspambots
Automatic report - Port Scan Attack
2020-08-12 19:20:57
180.246.148.62 attack
Unauthorized connection attempt from IP address 180.246.148.62 on Port 445(SMB)
2020-08-08 04:09:07
180.246.148.113 attack
Unauthorized connection attempt from IP address 180.246.148.113 on Port 445(SMB)
2020-07-23 05:23:48
180.246.148.11 attackbots
Jun 22 10:56:28 IngegnereFirenze sshd[8272]: Failed password for invalid user admin from 180.246.148.11 port 51602 ssh2
...
2020-06-22 19:25:55
180.246.148.167 attackspam
1591704531 - 06/09/2020 14:08:51 Host: 180.246.148.167/180.246.148.167 Port: 445 TCP Blocked
2020-06-09 20:31:26
180.246.148.35 attackspam
Email rejected due to spam filtering
2020-02-25 04:28:13
180.246.148.185 attackbotsspam
Unauthorized connection attempt from IP address 180.246.148.185 on Port 445(SMB)
2020-01-14 03:32:54
180.246.148.243 attackbotsspam
Unauthorized connection attempt detected from IP address 180.246.148.243 to port 445
2019-12-27 17:24:03
180.246.148.225 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 24-11-2019 06:20:22.
2019-11-24 20:25:17
180.246.148.44 attackbots
Unauthorized connection attempt from IP address 180.246.148.44 on Port 445(SMB)
2019-08-14 11:45:36
180.246.148.20 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-03 03:24:04,951 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.246.148.20)
2019-08-03 15:21:40
180.246.148.49 attackspambots
Unauthorised access (Jul 18) SRC=180.246.148.49 LEN=52 TTL=116 ID=21911 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-18 17:19:48
180.246.148.199 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-03 07:06:52
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.246.148.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36221
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;180.246.148.150.		IN	A

;; AUTHORITY SECTION:
.			480	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019123100 1800 900 604800 86400

;; Query time: 242 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Dec 31 18:10:05 CST 2019
;; MSG SIZE  rcvd: 119
Host info
Host 150.148.246.180.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 150.148.246.180.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
123.56.110.239 attackbotsspam
Unauthorized connection attempt detected from IP address 123.56.110.239 to port 1433 [J]
2020-01-17 06:34:15
77.247.108.91 attackbotsspam
77.247.108.91 was recorded 7 times by 2 hosts attempting to connect to the following ports: 5060. Incident counter (4h, 24h, all-time): 7, 42, 1052
2020-01-17 06:01:45
193.188.22.188 attack
SSH Server BruteForce Attack
2020-01-17 06:19:47
42.99.117.44 attack
Jan 16 16:11:59 cumulus sshd[3872]: Invalid user mmm from 42.99.117.44 port 56058
Jan 16 16:11:59 cumulus sshd[3872]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.99.117.44
Jan 16 16:12:01 cumulus sshd[3872]: Failed password for invalid user mmm from 42.99.117.44 port 56058 ssh2
Jan 16 16:12:02 cumulus sshd[3872]: Received disconnect from 42.99.117.44 port 56058:11: Bye Bye [preauth]
Jan 16 16:12:02 cumulus sshd[3872]: Disconnected from 42.99.117.44 port 56058 [preauth]
Jan 16 16:19:34 cumulus sshd[4171]: Invalid user mysql from 42.99.117.44 port 45312
Jan 16 16:19:34 cumulus sshd[4171]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.99.117.44
Jan 16 16:19:36 cumulus sshd[4171]: Failed password for invalid user mysql from 42.99.117.44 port 45312 ssh2
Jan 16 16:19:36 cumulus sshd[4171]: Received disconnect from 42.99.117.44 port 45312:11: Bye Bye [preauth]
Jan 16 16:19:36 cumulus ss........
-------------------------------
2020-01-17 06:10:32
189.108.40.2 attack
Automatic report - Banned IP Access
2020-01-17 06:22:37
150.95.54.138 attack
WordPress wp-login brute force :: 150.95.54.138 0.096 BYPASS [16/Jan/2020:21:19:54  0000] [censored_2] "POST /wp-login.php HTTP/1.1" 200 2287 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-01-17 06:12:07
122.238.138.77 attack
Unauthorized connection attempt detected from IP address 122.238.138.77 to port 445 [T]
2020-01-17 06:34:32
139.199.159.77 attackbots
Automatic report - Banned IP Access
2020-01-17 06:03:36
114.199.67.235 attackspam
firewall-block, port(s): 222/tcp
2020-01-17 05:57:46
197.50.31.77 attackspambots
Unauthorized connection attempt detected from IP address 197.50.31.77 to port 445
2020-01-17 06:10:55
14.162.19.90 attack
smtp probe/invalid login attempt
2020-01-17 06:12:39
70.184.65.96 attackbots
firewall-block, port(s): 23/tcp
2020-01-17 06:04:40
27.155.99.173 attackbots
Fail2Ban - SSH Bruteforce Attempt
2020-01-17 06:00:33
119.29.199.150 attackspambots
$f2bV_matches
2020-01-17 06:07:45
222.186.169.194 attackspam
2020-01-14 07:41:53 -> 2020-01-16 22:13:42 : 117 login attempts (222.186.169.194)
2020-01-17 06:15:52

Recently Reported IPs

117.194.34.49 178.166.94.241 52.97.247.26 48.169.193.127
124.116.91.16 63.121.112.109 146.255.22.219 98.154.199.235
149.28.176.7 49.228.50.253 97.236.186.81 215.179.154.253
3.85.166.110 34.44.139.100 58.99.32.149 110.138.151.132
94.253.93.25 182.109.247.188 212.83.146.219 46.32.67.61