Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Colombia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 191.148.142.165
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32111
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;191.148.142.165.		IN	A

;; AUTHORITY SECTION:
.			514	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 19:38:14 CST 2022
;; MSG SIZE  rcvd: 108
Host info
Host 165.142.148.191.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 165.142.148.191.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.73.235.149 attackspam
Repeated brute force against a port
2020-04-27 00:53:51
40.68.133.163 attack
Apr 26 15:57:11 server sshd[13224]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.68.133.163
Apr 26 15:57:12 server sshd[13224]: Failed password for invalid user jessica from 40.68.133.163 port 59240 ssh2
Apr 26 16:01:45 server sshd[13757]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.68.133.163
...
2020-04-27 01:02:14
106.13.203.62 attack
Repeated brute force against a port
2020-04-27 00:19:19
36.78.197.253 attack
Unauthorized connection attempt from IP address 36.78.197.253 on Port 445(SMB)
2020-04-27 00:39:24
103.60.180.132 attackspam
Brute force attempt
2020-04-27 00:26:30
14.176.18.22 attackbotsspam
Unauthorized connection attempt from IP address 14.176.18.22 on Port 445(SMB)
2020-04-27 00:27:01
129.204.60.121 attackbotsspam
$f2bV_matches
2020-04-27 00:41:17
89.236.235.94 attackspam
Unauthorized connection attempt from IP address 89.236.235.94 on Port 445(SMB)
2020-04-27 01:06:53
77.222.105.243 attackspam
Unauthorized connection attempt from IP address 77.222.105.243 on Port 445(SMB)
2020-04-27 00:49:50
206.81.11.216 attackspambots
Apr 26 12:52:55 web8 sshd\[4583\]: Invalid user secretariat from 206.81.11.216
Apr 26 12:52:55 web8 sshd\[4583\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216
Apr 26 12:52:57 web8 sshd\[4583\]: Failed password for invalid user secretariat from 206.81.11.216 port 52616 ssh2
Apr 26 12:57:38 web8 sshd\[7138\]: Invalid user dod from 206.81.11.216
Apr 26 12:57:38 web8 sshd\[7138\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.81.11.216
2020-04-27 00:58:47
150.109.150.77 attackbotsspam
5x Failed Password
2020-04-27 01:05:11
70.79.145.55 attackbotsspam
Port probing on unauthorized port 23
2020-04-27 00:26:17
167.71.229.132 attackspam
failed_logins
2020-04-27 00:50:09
1.24.149.148 attackbots
Unauthorized connection attempt detected from IP address 1.24.149.148 to port 23 [T]
2020-04-27 00:27:22
113.168.70.160 attack
Unauthorized connection attempt from IP address 113.168.70.160 on Port 445(SMB)
2020-04-27 00:29:22

Recently Reported IPs

10.141.219.211 198.82.200.164 46.130.107.14 229.157.162.206
221.35.64.50 5.88.163.32 139.70.120.251 34.136.27.154
186.164.123.157 55.78.139.66 160.202.220.174 115.93.39.27
242.92.29.120 74.117.85.40 185.13.19.21 2.148.16.51
198.130.217.69 86.198.94.45 43.247.75.1 205.1.219.234