Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Diemen

Region: North Holland

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 194.120.60.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29928
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;194.120.60.148.			IN	A

;; AUTHORITY SECTION:
.			504	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020050200 1800 900 604800 86400

;; Query time: 97 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat May 02 14:52:23 CST 2020
;; MSG SIZE  rcvd: 118
Host info
148.60.120.194.in-addr.arpa domain name pointer static.kpn.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.60.120.194.in-addr.arpa	name = static.kpn.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
150.95.217.109 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.217.109  user=root
Failed password for root from 150.95.217.109 port 52474 ssh2
Invalid user home from 150.95.217.109 port 57654
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.95.217.109
Failed password for invalid user home from 150.95.217.109 port 57654 ssh2
2019-12-21 18:48:44
185.207.232.232 attackbots
ssh failed login
2019-12-21 19:13:56
123.142.108.122 attack
Dec 21 08:45:50 game-panel sshd[11329]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.108.122
Dec 21 08:45:52 game-panel sshd[11329]: Failed password for invalid user Ubuntu from 123.142.108.122 port 54298 ssh2
Dec 21 08:52:03 game-panel sshd[11580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.142.108.122
2019-12-21 19:17:28
123.119.246.169 attack
[portscan] tcp/21 [FTP]
[scan/connect: 6 time(s)]
*(RWIN=65535)(12211217)
2019-12-21 18:43:53
189.210.53.178 attack
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-21 19:09:50
94.102.53.59 attackbots
Sextortion Scam Email

Return-Path: 
Received: from source:[94.102.53.59] helo:slot0.d0932.gq
Date: Fri, 20 Dec 2019 16:54:56 +0000
From: Save Yourself 
Reply-To: saveyourself@d0932.gq
Subject: _____ - I recorded you
Message-ID: <7_____0@d0932.gq>

Hey, I know your pass word is: _____

Your computer was infected with my malware, RAT (Remmote Administration Tool), your browser wasn"t updated / patched, in such case it"s enough to just vissit some website where my iframe is placed to get automatically infected, if you want to find out more - Google: "Drive-by exploit".

My malware gave me full acccess and control over your computer, meaning, I got acccess to all your accounts (see pass word above) and I can see everything on your screen, turn on your camera or microphone and you won"t even notice about it.

I collected all your privvate data and I RECORDED YOU (through your web-cam) SATISFYING YOURSELF!

After that I removed my malware to not leave any
2019-12-21 18:44:54
46.101.27.6 attackspam
Dec 21 11:47:02 host sshd[33807]: Invalid user admin from 46.101.27.6 port 57998
...
2019-12-21 19:07:15
113.161.34.79 attack
Dec 21 09:54:20 ns382633 sshd\[2090\]: Invalid user bobesku from 113.161.34.79 port 59025
Dec 21 09:54:20 ns382633 sshd\[2090\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.34.79
Dec 21 09:54:21 ns382633 sshd\[2090\]: Failed password for invalid user bobesku from 113.161.34.79 port 59025 ssh2
Dec 21 10:00:38 ns382633 sshd\[3508\]: Invalid user yeap from 113.161.34.79 port 35308
Dec 21 10:00:38 ns382633 sshd\[3508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.161.34.79
2019-12-21 18:54:12
203.114.109.57 attackspambots
Dec 21 11:30:19 localhost sshd[10665]: Invalid user postgres from 203.114.109.57 port 39186
...
2019-12-21 18:55:11
101.78.209.39 attack
Dec 21 11:52:02 MainVPS sshd[14075]: Invalid user dethlefsen from 101.78.209.39 port 43549
Dec 21 11:52:02 MainVPS sshd[14075]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.209.39
Dec 21 11:52:02 MainVPS sshd[14075]: Invalid user dethlefsen from 101.78.209.39 port 43549
Dec 21 11:52:04 MainVPS sshd[14075]: Failed password for invalid user dethlefsen from 101.78.209.39 port 43549 ssh2
Dec 21 11:58:02 MainVPS sshd[25742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.78.209.39  user=root
Dec 21 11:58:05 MainVPS sshd[25742]: Failed password for root from 101.78.209.39 port 46706 ssh2
...
2019-12-21 19:13:25
79.137.82.213 attack
Dec 21 11:32:10 cvbnet sshd[30198]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.82.213 
Dec 21 11:32:12 cvbnet sshd[30198]: Failed password for invalid user testxp from 79.137.82.213 port 39678 ssh2
...
2019-12-21 19:02:32
45.119.82.54 attack
45.119.82.54 - - [21/Dec/2019:07:23:01 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.119.82.54 - - [21/Dec/2019:07:23:02 +0100] "POST /wp-login.php HTTP/1.1" 200 2298 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.119.82.54 - - [21/Dec/2019:07:23:19 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.119.82.54 - - [21/Dec/2019:07:23:20 +0100] "POST /wp-login.php HTTP/1.1" 200 2273 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.119.82.54 - - [21/Dec/2019:07:25:33 +0100] "GET /wp-login.php HTTP/1.1" 200 1901 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
45.119.82.54 - - [21/Dec/2019:07:25:34 +0100] "POST /wp-login.php HTTP/1.1" 200 2273 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-12-21 19:10:56
49.89.252.164 attackspam
/inc/md5.asp
2019-12-21 18:44:24
79.127.126.198 attack
loopsrockreggae.com 79.127.126.198 [21/Dec/2019:07:26:07 +0100] "POST /wp-login.php HTTP/1.1" 200 6279 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
loopsrockreggae.com 79.127.126.198 [21/Dec/2019:07:26:08 +0100] "POST /xmlrpc.php HTTP/1.1" 200 4071 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-12-21 18:45:16
45.55.231.94 attackspam
Invalid user guest from 45.55.231.94 port 41188
2019-12-21 19:19:35

Recently Reported IPs

72.208.223.250 192.134.206.54 106.246.25.78 88.155.38.62
41.66.103.124 164.100.251.37 3.211.146.27 88.213.54.10
160.111.62.83 117.69.5.67 177.74.5.250 51.143.15.157
62.107.125.236 24.216.143.1 52.112.54.188 3.204.151.66
42.80.147.144 74.29.101.153 94.164.108.145 81.87.66.172