Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Angola

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.148.52.189
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 54729
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;197.148.52.189.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012801 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 29 02:58:11 CST 2025
;; MSG SIZE  rcvd: 107
Host info
189.52.148.197.in-addr.arpa domain name pointer cust189-52.148.197.tvcabo.ao.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
189.52.148.197.in-addr.arpa	name = cust189-52.148.197.tvcabo.ao.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
51.15.108.244 attackbotsspam
2020-09-21T20:11:42.860769abusebot-2.cloudsearch.cf sshd[10656]: Invalid user weblogic from 51.15.108.244 port 50594
2020-09-21T20:11:42.866636abusebot-2.cloudsearch.cf sshd[10656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.108.244
2020-09-21T20:11:42.860769abusebot-2.cloudsearch.cf sshd[10656]: Invalid user weblogic from 51.15.108.244 port 50594
2020-09-21T20:11:44.705198abusebot-2.cloudsearch.cf sshd[10656]: Failed password for invalid user weblogic from 51.15.108.244 port 50594 ssh2
2020-09-21T20:15:40.342646abusebot-2.cloudsearch.cf sshd[10848]: Invalid user bruno from 51.15.108.244 port 60038
2020-09-21T20:15:40.349200abusebot-2.cloudsearch.cf sshd[10848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.15.108.244
2020-09-21T20:15:40.342646abusebot-2.cloudsearch.cf sshd[10848]: Invalid user bruno from 51.15.108.244 port 60038
2020-09-21T20:15:42.528788abusebot-2.cloudsearch.cf sshd[10848
...
2020-09-22 04:32:56
35.179.53.255 attackspambots
20 attempts against mh-ssh on air
2020-09-22 04:19:06
114.78.156.123 attackbotsspam
IP 114.78.156.123 attacked honeypot on port: 3306 at 9/21/2020 10:04:14 AM
2020-09-22 04:32:04
116.59.25.190 attack
Sep 21 20:52:56 pve1 sshd[9110]: Failed password for root from 116.59.25.190 port 53660 ssh2
...
2020-09-22 04:48:15
49.247.21.43 attack
Sep 21 13:48:47 george sshd[14763]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.21.43  user=root
Sep 21 13:48:49 george sshd[14763]: Failed password for root from 49.247.21.43 port 49856 ssh2
Sep 21 13:52:40 george sshd[14823]: Invalid user wwwadmin from 49.247.21.43 port 54046
Sep 21 13:52:40 george sshd[14823]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.247.21.43 
Sep 21 13:52:42 george sshd[14823]: Failed password for invalid user wwwadmin from 49.247.21.43 port 54046 ssh2
...
2020-09-22 04:28:54
49.235.28.55 attackspambots
Sep 21 20:55:37 vps647732 sshd[12615]: Failed password for root from 49.235.28.55 port 57282 ssh2
...
2020-09-22 04:13:08
170.78.21.249 attack
Sep 21 19:06:25 vps639187 sshd\[26918\]: Invalid user user from 170.78.21.249 port 34783
Sep 21 19:06:25 vps639187 sshd\[26918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=170.78.21.249
Sep 21 19:06:27 vps639187 sshd\[26918\]: Failed password for invalid user user from 170.78.21.249 port 34783 ssh2
...
2020-09-22 04:42:03
51.83.42.108 attack
Sep 21 18:50:36 gitlab sshd[336243]: Failed password for invalid user ftp1 from 51.83.42.108 port 36002 ssh2
Sep 21 18:53:57 gitlab sshd[336509]: Invalid user zabbix from 51.83.42.108 port 41982
Sep 21 18:53:57 gitlab sshd[336509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.42.108 
Sep 21 18:53:57 gitlab sshd[336509]: Invalid user zabbix from 51.83.42.108 port 41982
Sep 21 18:53:59 gitlab sshd[336509]: Failed password for invalid user zabbix from 51.83.42.108 port 41982 ssh2
...
2020-09-22 04:12:49
159.89.99.68 attackbotsspam
159.89.99.68 - - [19/Sep/2020:08:30:16 +0200] "www.ruhnke.cloud" "POST /wp-login.php HTTP/1.1" 200 4945 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" 0.834
159.89.99.68 - - [19/Sep/2020:08:30:23 +0200] "www.ruhnke.cloud" "POST /xmlrpc.php HTTP/1.1" 200 472 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" 2.246
159.89.99.68 - - [20/Sep/2020:18:38:25 +0200] "www.ruhnke.cloud" "POST /wp-login.php HTTP/1.1" 401 3586 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" 3.698
159.89.99.68 - - [20/Sep/2020:18:38:28 +0200] "www.ruhnke.cloud" "POST /xmlrpc.php HTTP/1.1" 200 393 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" 2.701
159.89.99.68 - - [21/Sep/2020:20:42:54 +0200] "www.ruhnke.cloud" "POST /wp-login.php HTTP/1.1" 200 4954 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0" "-" 0.809
...
2020-09-22 04:13:50
212.70.149.20 attackbots
Sep 21 22:15:49 mail postfix/smtpd\[11603\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 21 22:16:14 mail postfix/smtpd\[11603\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 21 22:16:40 mail postfix/smtpd\[11603\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
Sep 21 22:47:04 mail postfix/smtpd\[12485\]: warning: unknown\[212.70.149.20\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6\
2020-09-22 04:46:16
196.52.43.98 attack
srv02 Mass scanning activity detected Target: 20(ftp-data) ..
2020-09-22 04:17:02
115.79.43.25 attack
Sep 21 19:04:44 host sshd[15352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=115.79.43.25  user=root
Sep 21 19:04:46 host sshd[15352]: Failed password for root from 115.79.43.25 port 4845 ssh2
...
2020-09-22 04:23:57
122.51.37.26 attack
Sep 21 19:00:47 s2 sshd[3292]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.37.26 
Sep 21 19:00:49 s2 sshd[3292]: Failed password for invalid user vbox from 122.51.37.26 port 40670 ssh2
Sep 21 19:04:57 s2 sshd[3475]: Failed password for root from 122.51.37.26 port 52968 ssh2
2020-09-22 04:10:33
94.23.179.193 attackspambots
Sep 21 19:04:55 ns3164893 sshd[11376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.23.179.193
Sep 21 19:04:58 ns3164893 sshd[11376]: Failed password for invalid user odoo2 from 94.23.179.193 port 38835 ssh2
...
2020-09-22 04:11:05
106.12.194.204 attackspam
Sep 21 19:17:05 inter-technics sshd[739]: Invalid user itadmin from 106.12.194.204 port 49630
Sep 21 19:17:05 inter-technics sshd[739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.204
Sep 21 19:17:05 inter-technics sshd[739]: Invalid user itadmin from 106.12.194.204 port 49630
Sep 21 19:17:07 inter-technics sshd[739]: Failed password for invalid user itadmin from 106.12.194.204 port 49630 ssh2
Sep 21 19:20:22 inter-technics sshd[916]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.194.204  user=root
Sep 21 19:20:23 inter-technics sshd[916]: Failed password for root from 106.12.194.204 port 37914 ssh2
...
2020-09-22 04:44:50

Recently Reported IPs

60.77.135.88 83.238.124.104 229.107.203.162 216.83.153.62
144.145.193.146 185.241.253.4 17.240.121.169 141.115.182.201
24.6.72.91 222.27.36.217 199.150.154.172 236.87.140.134
189.252.41.161 222.1.2.176 169.151.208.218 46.188.191.194
56.73.73.46 163.198.186.66 201.42.22.198 159.249.206.34