Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Sweden

Internet Service Provider: Orange

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.0.185.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 46814
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.0.185.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 09:35:59 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 148.185.0.2.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.185.0.2.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
194.165.99.231 attackbotsspam
Time:     Thu Sep 24 23:39:06 2020 +0000
IP:       194.165.99.231 (SI/Slovenia/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 24 23:33:25 activeserver sshd[8018]: Invalid user smb from 194.165.99.231 port 39052
Sep 24 23:33:28 activeserver sshd[8018]: Failed password for invalid user smb from 194.165.99.231 port 39052 ssh2
Sep 24 23:37:40 activeserver sshd[18940]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.165.99.231  user=root
Sep 24 23:37:42 activeserver sshd[18940]: Failed password for root from 194.165.99.231 port 55294 ssh2
Sep 24 23:39:04 activeserver sshd[24362]: Invalid user gera from 194.165.99.231 port 60714
2020-09-25 18:01:21
145.239.82.192 attack
Sep 25 10:41:28 OPSO sshd\[2550\]: Invalid user testuser from 145.239.82.192 port 40650
Sep 25 10:41:28 OPSO sshd\[2550\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.192
Sep 25 10:41:30 OPSO sshd\[2550\]: Failed password for invalid user testuser from 145.239.82.192 port 40650 ssh2
Sep 25 10:44:58 OPSO sshd\[3110\]: Invalid user cash from 145.239.82.192 port 42890
Sep 25 10:44:58 OPSO sshd\[3110\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=145.239.82.192
2020-09-25 17:45:02
1.235.192.218 attackspambots
2020-09-25T11:53:49+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-09-25 17:57:22
101.132.128.224 attackbots
Sep 24 16:31:10 r.ca sshd[12668]: Failed password for root from 101.132.128.224 port 37330 ssh2
2020-09-25 17:37:16
118.250.97.93 attackspam
Brute force blocker - service: proftpd1 - aantal: 97 - Sat Aug 25 13:05:17 2018
2020-09-25 18:07:28
37.187.135.130 attackbotsspam
37.187.135.130 - - [25/Sep/2020:06:27:33 +0100] "POST /wp-login.php HTTP/1.1" 200 2265 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.187.135.130 - - [25/Sep/2020:06:27:34 +0100] "POST /wp-login.php HTTP/1.1" 200 2231 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
37.187.135.130 - - [25/Sep/2020:06:27:34 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-09-25 17:43:36
218.92.0.247 attackspam
Sep 25 11:23:51 dev0-dcde-rnet sshd[26110]: Failed password for root from 218.92.0.247 port 12622 ssh2
Sep 25 11:23:54 dev0-dcde-rnet sshd[26110]: Failed password for root from 218.92.0.247 port 12622 ssh2
Sep 25 11:23:57 dev0-dcde-rnet sshd[26110]: Failed password for root from 218.92.0.247 port 12622 ssh2
Sep 25 11:24:00 dev0-dcde-rnet sshd[26110]: Failed password for root from 218.92.0.247 port 12622 ssh2
2020-09-25 17:36:01
112.85.42.200 attack
detected by Fail2Ban
2020-09-25 17:32:38
112.85.42.185 attack
Sep 25 06:30:07 funkybot sshd[11437]: Failed password for root from 112.85.42.185 port 59551 ssh2
Sep 25 06:30:09 funkybot sshd[11437]: Failed password for root from 112.85.42.185 port 59551 ssh2
...
2020-09-25 18:03:22
64.227.8.111 attackspam
Sep 24 19:54:26 hpm sshd\[6272\]: Invalid user melissa from 64.227.8.111
Sep 24 19:54:26 hpm sshd\[6272\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.8.111
Sep 24 19:54:28 hpm sshd\[6272\]: Failed password for invalid user melissa from 64.227.8.111 port 33920 ssh2
Sep 24 20:01:20 hpm sshd\[6749\]: Invalid user username from 64.227.8.111
Sep 24 20:01:20 hpm sshd\[6749\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.8.111
2020-09-25 17:48:51
58.34.128.220 attackspambots
Brute force blocker - service: proftpd1 - aantal: 80 - Sat Aug 25 10:35:18 2018
2020-09-25 18:10:46
52.255.192.248 attackbots
Sep 25 11:47:56 db sshd[19345]: User root from 52.255.192.248 not allowed because none of user's groups are listed in AllowGroups
...
2020-09-25 17:59:47
167.57.98.57 attackbots
Automatic report - Port Scan Attack
2020-09-25 18:11:05
142.11.192.246 attackspam
lfd: (smtpauth) Failed SMTP AUTH login from 142.11.192.246 (client-142-11-192-246.hostwindsdns.com): 5 in the last 3600 secs - Mon Aug 27 13:24:44 2018
2020-09-25 17:28:52
23.100.5.96 attackspam
[f2b] sshd bruteforce, retries: 1
2020-09-25 17:45:49

Recently Reported IPs

99.240.236.141 33.0.195.95 81.7.27.11 87.233.122.53
2.249.214.74 156.128.34.252 182.189.115.245 222.72.148.1
239.34.184.115 140.183.139.160 72.119.219.82 67.237.135.53
217.3.104.183 197.253.82.176 233.108.27.66 150.35.49.1
53.12.150.150 127.197.161.28 22.78.181.27 217.208.153.209