Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Stockholm

Region: Stockholm

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: Com Hem AB

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 188.148.146.52
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57093
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;188.148.146.52.			IN	A

;; AUTHORITY SECTION:
.			2769	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019061001 1800 900 604800 86400

;; Query time: 0 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jun 11 01:25:35 CST 2019
;; MSG SIZE  rcvd: 118

Host info
Host 52.146.148.188.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 52.146.148.188.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
104.236.131.54 attackbotsspam
2019-08-17T01:49:44.771581abusebot-2.cloudsearch.cf sshd\[6752\]: Invalid user firebird from 104.236.131.54 port 47689
2019-08-17 10:46:13
191.241.247.150 attackspambots
Aug 17 03:20:19 XXX sshd[32060]: Invalid user pao from 191.241.247.150 port 35646
2019-08-17 10:19:22
49.88.112.85 attack
Aug 17 04:06:14 dev0-dcde-rnet sshd[10481]: Failed password for root from 49.88.112.85 port 26727 ssh2
Aug 17 04:06:22 dev0-dcde-rnet sshd[10485]: Failed password for root from 49.88.112.85 port 27874 ssh2
Aug 17 04:06:24 dev0-dcde-rnet sshd[10485]: Failed password for root from 49.88.112.85 port 27874 ssh2
2019-08-17 10:06:43
117.44.166.168 attack
Unauthorized connection attempt from IP address 117.44.166.168 on Port 445(SMB)
2019-08-17 10:27:37
37.53.75.17 attackspambots
WordPress brute force
2019-08-17 10:44:04
189.248.188.107 attack
Unauthorized connection attempt from IP address 189.248.188.107 on Port 445(SMB)
2019-08-17 10:19:50
58.115.161.172 attack
SSH Brute Force, server-1 sshd[4149]: Failed password for root from 58.115.161.172 port 57300 ssh2
2019-08-17 10:30:41
212.90.169.134 attackspam
Unauthorized connection attempt from IP address 212.90.169.134 on Port 445(SMB)
2019-08-17 10:45:35
109.108.181.165 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-08-16 19:24:03,198 INFO [amun_request_handler] PortScan Detected on Port: 445 (109.108.181.165)
2019-08-17 10:32:17
213.211.175.248 attack
Unauthorized connection attempt from IP address 213.211.175.248 on Port 3389(RDP)
2019-08-17 10:08:00
45.77.241.180 attackspambots
Wordpress Admin Login attack
2019-08-17 10:43:35
80.211.12.23 attack
Multiple SSH auth failures recorded by fail2ban
2019-08-17 10:40:42
189.203.230.84 attackbots
Unauthorized connection attempt from IP address 189.203.230.84 on Port 445(SMB)
2019-08-17 10:28:56
180.251.181.246 attackbots
Unauthorized connection attempt from IP address 180.251.181.246 on Port 445(SMB)
2019-08-17 10:31:47
54.171.88.38 attackspam
Wordpress Admin Login attack
2019-08-17 10:40:58

Recently Reported IPs

53.234.81.70 206.230.156.111 58.186.121.176 202.47.40.211
121.130.170.36 147.169.54.166 121.244.121.100 203.123.40.177
104.23.231.228 190.136.175.102 51.190.125.34 12.105.210.24
201.244.173.246 80.31.42.46 69.16.213.2 24.74.135.13
61.244.92.30 2.28.40.235 147.251.40.100 51.89.6.194