Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Banjarmasin

Region: South Kalimantan

Country: Indonesia

Internet Service Provider: PT Telkom Indonesia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
Unauthorized connection attempt from IP address 180.246.148.185 on Port 445(SMB)
2020-01-14 03:32:54
Comments on same subnet:
IP Type Details Datetime
180.246.148.212 attackspambots
Automatic report - Port Scan Attack
2020-08-12 19:20:57
180.246.148.62 attack
Unauthorized connection attempt from IP address 180.246.148.62 on Port 445(SMB)
2020-08-08 04:09:07
180.246.148.113 attack
Unauthorized connection attempt from IP address 180.246.148.113 on Port 445(SMB)
2020-07-23 05:23:48
180.246.148.11 attackbots
Jun 22 10:56:28 IngegnereFirenze sshd[8272]: Failed password for invalid user admin from 180.246.148.11 port 51602 ssh2
...
2020-06-22 19:25:55
180.246.148.167 attackspam
1591704531 - 06/09/2020 14:08:51 Host: 180.246.148.167/180.246.148.167 Port: 445 TCP Blocked
2020-06-09 20:31:26
180.246.148.35 attackspam
Email rejected due to spam filtering
2020-02-25 04:28:13
180.246.148.150 attackbotsspam
Unauthorized connection attempt detected from IP address 180.246.148.150 to port 445
2019-12-31 18:10:10
180.246.148.243 attackbotsspam
Unauthorized connection attempt detected from IP address 180.246.148.243 to port 445
2019-12-27 17:24:03
180.246.148.225 attackbots
Attempt to attack host OS, exploiting network vulnerabilities, on 24-11-2019 06:20:22.
2019-11-24 20:25:17
180.246.148.44 attackbots
Unauthorized connection attempt from IP address 180.246.148.44 on Port 445(SMB)
2019-08-14 11:45:36
180.246.148.20 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-03 03:24:04,951 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.246.148.20)
2019-08-03 15:21:40
180.246.148.49 attackspambots
Unauthorised access (Jul 18) SRC=180.246.148.49 LEN=52 TTL=116 ID=21911 DF TCP DPT=445 WINDOW=8192 SYN
2019-07-18 17:19:48
180.246.148.199 attackspambots
Honeypot attack, port: 445, PTR: PTR record not found
2019-07-03 07:06:52
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.246.148.185
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35310
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;180.246.148.185.		IN	A

;; AUTHORITY SECTION:
.			334	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020011301 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 14 03:32:49 CST 2020
;; MSG SIZE  rcvd: 119
Host info
Host 185.148.246.180.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 185.148.246.180.in-addr.arpa: SERVFAIL

Related IP info:
Related comments:
IP Type Details Datetime
222.186.31.83 attackspam
Jul 26 00:07:53 PorscheCustomer sshd[26867]: Failed password for root from 222.186.31.83 port 41495 ssh2
Jul 26 00:08:02 PorscheCustomer sshd[26869]: Failed password for root from 222.186.31.83 port 21303 ssh2
Jul 26 00:08:04 PorscheCustomer sshd[26869]: Failed password for root from 222.186.31.83 port 21303 ssh2
...
2020-07-26 06:08:13
212.129.16.53 attack
Invalid user kroener from 212.129.16.53 port 40260
2020-07-26 06:38:09
94.102.50.166 attackbotsspam
SmallBizIT.US 3 packets to tcp(13031,13032,13089)
2020-07-26 06:23:36
222.186.169.192 attack
Fail2Ban
2020-07-26 06:30:38
122.51.217.131 attackspam
Exploited Host.
2020-07-26 06:15:04
122.227.120.146 attackspam
Exploited Host.
2020-07-26 06:26:28
103.98.17.23 attackspambots
Invalid user test2 from 103.98.17.23 port 46080
2020-07-26 06:25:30
82.17.113.19 attackbotsspam
Port 22 Scan, PTR: None
2020-07-26 06:36:23
104.140.188.46 attack
161/udp 50995/tcp 7777/tcp...
[2020-05-25/07-25]47pkt,11pt.(tcp),1pt.(udp)
2020-07-26 06:13:33
122.51.243.223 attackbots
Jul 25 19:26:37 lukav-desktop sshd\[21582\]: Invalid user sysadmin from 122.51.243.223
Jul 25 19:26:37 lukav-desktop sshd\[21582\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.243.223
Jul 25 19:26:40 lukav-desktop sshd\[21582\]: Failed password for invalid user sysadmin from 122.51.243.223 port 34338 ssh2
Jul 25 19:29:59 lukav-desktop sshd\[21615\]: Invalid user liwen from 122.51.243.223
Jul 25 19:29:59 lukav-desktop sshd\[21615\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.243.223
2020-07-26 06:12:02
122.51.242.122 attackbotsspam
Exploited Host.
2020-07-26 06:13:03
157.230.20.53 attack
Invalid user test from 157.230.20.53 port 42262
2020-07-26 06:26:02
122.51.156.113 attackbotsspam
Jul 25 17:39:16 george sshd[23685]: Failed password for invalid user owen from 122.51.156.113 port 51294 ssh2
Jul 25 17:43:11 george sshd[23712]: Invalid user sto from 122.51.156.113 port 38274
Jul 25 17:43:11 george sshd[23712]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.156.113 
Jul 25 17:43:13 george sshd[23712]: Failed password for invalid user sto from 122.51.156.113 port 38274 ssh2
Jul 25 17:47:01 george sshd[23747]: Invalid user katy from 122.51.156.113 port 53486
...
2020-07-26 06:19:43
163.172.178.167 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-07-26 06:16:25
167.71.175.10 attackbotsspam
Jul 25 17:11:34 debian-2gb-nbg1-2 kernel: \[17948409.059121\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=167.71.175.10 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=244 ID=44053 PROTO=TCP SPT=46231 DPT=8443 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-26 06:05:05

Recently Reported IPs

126.200.222.182 15.164.133.188 103.142.10.245 34.241.153.202
5.9.246.145 201.20.101.10 220.66.167.134 195.228.79.79
95.6.31.214 195.32.40.208 56.87.142.203 157.245.76.114
80.88.10.2 52.3.174.125 189.208.236.141 177.195.120.89
94.101.186.193 69.94.158.87 210.18.171.190 103.17.132.236