Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.147.148.4
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20061
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;199.147.148.4.			IN	A

;; AUTHORITY SECTION:
.			517	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020052102 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 22 09:00:39 CST 2020
;; MSG SIZE  rcvd: 117
Host info
4.148.147.199.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 4.148.147.199.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
147.135.133.29 attack
Oct 21 05:54:57 vpn01 sshd[805]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.133.29
Oct 21 05:54:59 vpn01 sshd[805]: Failed password for invalid user fadl from 147.135.133.29 port 51784 ssh2
...
2019-10-21 12:50:02
201.48.65.147 attack
Oct 21 06:54:44 hosting sshd[19742]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.48.65.147  user=root
Oct 21 06:54:46 hosting sshd[19742]: Failed password for root from 201.48.65.147 port 55548 ssh2
...
2019-10-21 12:57:20
141.8.144.37 attack
port scan and connect, tcp 443 (https)
2019-10-21 13:13:21
45.227.253.138 attackbotsspam
Oct 21 05:10:32 heicom postfix/smtpd\[1098\]: warning: unknown\[45.227.253.138\]: SASL LOGIN authentication failed: authentication failure
Oct 21 05:10:36 heicom postfix/smtpd\[775\]: warning: unknown\[45.227.253.138\]: SASL LOGIN authentication failed: authentication failure
Oct 21 05:10:37 heicom postfix/smtpd\[1098\]: warning: unknown\[45.227.253.138\]: SASL LOGIN authentication failed: authentication failure
Oct 21 05:16:35 heicom postfix/smtpd\[1098\]: warning: unknown\[45.227.253.138\]: SASL LOGIN authentication failed: authentication failure
Oct 21 05:16:37 heicom postfix/smtpd\[775\]: warning: unknown\[45.227.253.138\]: SASL LOGIN authentication failed: authentication failure
...
2019-10-21 13:23:23
175.211.112.254 attack
Oct 21 05:00:01 vpn01 sshd[32662]: Failed password for root from 175.211.112.254 port 56126 ssh2
...
2019-10-21 12:56:15
104.243.41.97 attackbotsspam
Oct 21 05:16:55 hcbbdb sshd\[18237\]: Invalid user abc8812345 from 104.243.41.97
Oct 21 05:16:55 hcbbdb sshd\[18237\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.41.97
Oct 21 05:16:57 hcbbdb sshd\[18237\]: Failed password for invalid user abc8812345 from 104.243.41.97 port 35666 ssh2
Oct 21 05:20:10 hcbbdb sshd\[18550\]: Invalid user terate from 104.243.41.97
Oct 21 05:20:10 hcbbdb sshd\[18550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.243.41.97
2019-10-21 13:26:10
49.235.139.216 attackspam
Oct 20 18:48:08 hanapaa sshd\[19471\]: Invalid user rambo from 49.235.139.216
Oct 20 18:48:08 hanapaa sshd\[19471\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.139.216
Oct 20 18:48:10 hanapaa sshd\[19471\]: Failed password for invalid user rambo from 49.235.139.216 port 44860 ssh2
Oct 20 18:53:15 hanapaa sshd\[19869\]: Invalid user 123456 from 49.235.139.216
Oct 20 18:53:15 hanapaa sshd\[19869\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.139.216
2019-10-21 13:02:38
122.152.231.178 attackbots
Oct 21 06:46:27 meumeu sshd[6282]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.231.178 
Oct 21 06:46:29 meumeu sshd[6282]: Failed password for invalid user zhang from 122.152.231.178 port 57262 ssh2
Oct 21 06:46:47 meumeu sshd[6340]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.231.178 
...
2019-10-21 12:58:41
222.186.175.183 attackspam
Oct 21 06:39:54 meumeu sshd[5164]: Failed password for root from 222.186.175.183 port 58354 ssh2
Oct 21 06:40:08 meumeu sshd[5164]: Failed password for root from 222.186.175.183 port 58354 ssh2
Oct 21 06:40:13 meumeu sshd[5164]: Failed password for root from 222.186.175.183 port 58354 ssh2
Oct 21 06:40:14 meumeu sshd[5164]: error: maximum authentication attempts exceeded for root from 222.186.175.183 port 58354 ssh2 [preauth]
...
2019-10-21 12:51:07
5.39.67.154 attackspambots
Oct 21 04:05:48 game-panel sshd[16095]: Failed password for root from 5.39.67.154 port 49238 ssh2
Oct 21 04:09:34 game-panel sshd[16316]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.39.67.154
Oct 21 04:09:36 game-panel sshd[16316]: Failed password for invalid user kathleen from 5.39.67.154 port 40453 ssh2
2019-10-21 13:10:50
119.29.11.242 attackbots
2019-10-21T05:01:04.582314abusebot-7.cloudsearch.cf sshd\[26910\]: Invalid user com!@\# from 119.29.11.242 port 50686
2019-10-21 13:28:14
112.198.194.243 attack
Oct 20 18:38:04 hanapaa sshd\[18544\]: Invalid user vu from 112.198.194.243
Oct 20 18:38:04 hanapaa sshd\[18544\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.194.243
Oct 20 18:38:06 hanapaa sshd\[18544\]: Failed password for invalid user vu from 112.198.194.243 port 29167 ssh2
Oct 20 18:42:28 hanapaa sshd\[18996\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.198.194.243  user=root
Oct 20 18:42:30 hanapaa sshd\[18996\]: Failed password for root from 112.198.194.243 port 48686 ssh2
2019-10-21 12:54:56
222.186.180.9 attackspambots
Oct 21 05:02:57 ip-172-31-1-72 sshd\[27821\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
Oct 21 05:02:59 ip-172-31-1-72 sshd\[27821\]: Failed password for root from 222.186.180.9 port 42878 ssh2
Oct 21 05:03:05 ip-172-31-1-72 sshd\[27821\]: Failed password for root from 222.186.180.9 port 42878 ssh2
Oct 21 05:03:09 ip-172-31-1-72 sshd\[27821\]: Failed password for root from 222.186.180.9 port 42878 ssh2
Oct 21 05:03:31 ip-172-31-1-72 sshd\[27844\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.9  user=root
2019-10-21 13:17:39
173.212.247.35 attack
Oct 21 05:54:28 andromeda sshd\[46522\]: Failed password for root from 173.212.247.35 port 56746 ssh2
Oct 21 05:54:28 andromeda sshd\[46536\]: Failed password for root from 173.212.247.35 port 56990 ssh2
Oct 21 05:54:28 andromeda sshd\[46530\]: Failed password for root from 173.212.247.35 port 56968 ssh2
2019-10-21 13:06:49
54.38.195.213 attack
failed root login
2019-10-21 12:58:07

Recently Reported IPs

191.225.176.73 162.227.117.221 103.217.64.6 41.220.75.159
122.95.116.215 85.106.12.150 255.16.127.215 212.223.239.107
168.245.196.208 158.28.253.56 56.200.129.236 21.5.163.73
35.44.109.49 37.153.208.194 202.24.121.198 92.63.103.154
163.172.136.138 177.140.72.165 27.59.150.255 51.38.190.91