Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Jorpeland

Region: Rogaland

Country: Norway

Internet Service Provider: Telenor

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.148.40.127
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44813
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.148.40.127.			IN	A

;; AUTHORITY SECTION:
.			457	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100401 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Oct 05 08:47:03 CST 2020
;; MSG SIZE  rcvd: 116
Host info
127.40.148.2.in-addr.arpa domain name pointer 2.148.40.127.tmi.telenormobil.no.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
127.40.148.2.in-addr.arpa	name = 2.148.40.127.tmi.telenormobil.no.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.18.118.183 attackbotsspam
Jun 16 00:45:30 home sshd[28383]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=14.18.118.183
Jun 16 00:45:32 home sshd[28383]: Failed password for invalid user show from 14.18.118.183 port 32800 ssh2
Jun 16 00:50:02 home sshd[28860]: Failed password for root from 14.18.118.183 port 53612 ssh2
...
2020-06-16 06:52:22
124.156.218.80 attackbots
Jun 15 22:27:52 scw-6657dc sshd[15648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.218.80
Jun 15 22:27:52 scw-6657dc sshd[15648]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.218.80
Jun 15 22:27:54 scw-6657dc sshd[15648]: Failed password for invalid user ubuntu from 124.156.218.80 port 55790 ssh2
...
2020-06-16 06:53:12
193.35.48.18 attackspambots
Jun 15 21:37:26 mail.srvfarm.net postfix/smtpd[512843]: warning: unknown[193.35.48.18]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 15 21:37:26 mail.srvfarm.net postfix/smtpd[512843]: lost connection after AUTH from unknown[193.35.48.18]
Jun 15 21:37:37 mail.srvfarm.net postfix/smtpd[504596]: lost connection after CONNECT from unknown[193.35.48.18]
Jun 15 21:37:44 mail.srvfarm.net postfix/smtpd[504543]: warning: unknown[193.35.48.18]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jun 15 21:37:44 mail.srvfarm.net postfix/smtpd[504634]: lost connection after CONNECT from unknown[193.35.48.18]
2020-06-16 06:45:42
187.41.158.112 attackspam
Invalid user beni from 187.41.158.112 port 58203
2020-06-16 06:19:09
94.191.42.78 attackspambots
Jun 15 22:43:21 lnxmysql61 sshd[12948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.191.42.78
2020-06-16 06:23:05
39.96.32.187 attack
Failed password for invalid user backuper from 39.96.32.187 port 50738 ssh2
2020-06-16 06:25:01
91.121.221.195 attackbotsspam
Invalid user ftpsecure from 91.121.221.195 port 58916
2020-06-16 06:36:28
3.22.148.155 attackspam
755. On Jun 15 2020 experienced a Brute Force SSH login attempt -> 6 unique times by 3.22.148.155.
2020-06-16 06:23:43
23.250.70.239 attack
(From williamspowell16@gmail.com) Hello,

Have you checked how your website ranks in Google? I've ran some of my search engine optimization reporting tools on your site to carefully examine its contents. The results showed there are many search keywords that you're not ranking for but that you should be ranking for so that your website can be easily found by people searching online for products/services related to your business. I can fix that!

Higher ranking in the search engines also increase the amount of business you do since you're getting more popularity and trust from people searching online, thus building credibility for your business. I'd be glad to work on your website. If you're interested, please reply to let me know about the best time to call and best number to contact. I hope we can talk soon!

 - Powell Williams | Website Optimizer
2020-06-16 06:41:03
216.105.139.66 attackbotsspam
bruteforce detected
2020-06-16 06:21:51
85.221.142.222 attackspambots
DATE:2020-06-15 22:43:12, IP:85.221.142.222, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-06-16 06:28:27
185.39.11.32 attackbots
06/15/2020-17:47:38.023289 185.39.11.32 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-06-16 06:31:12
45.80.65.82 attack
(sshd) Failed SSH login from 45.80.65.82 (RU/Russia/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun 15 23:07:03 amsweb01 sshd[14765]: Invalid user ts from 45.80.65.82 port 35952
Jun 15 23:07:05 amsweb01 sshd[14765]: Failed password for invalid user ts from 45.80.65.82 port 35952 ssh2
Jun 15 23:22:02 amsweb01 sshd[16660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.80.65.82  user=root
Jun 15 23:22:04 amsweb01 sshd[16660]: Failed password for root from 45.80.65.82 port 33344 ssh2
Jun 15 23:27:16 amsweb01 sshd[17441]: Invalid user chenwk from 45.80.65.82 port 60332
2020-06-16 06:51:52
192.144.232.49 attackspambots
Jun 16 00:05:13 nbi10206 sshd[7247]: Invalid user ahg from 192.144.232.49 port 37692
Jun 16 00:05:15 nbi10206 sshd[7247]: Failed password for invalid user ahg from 192.144.232.49 port 37692 ssh2
Jun 16 00:05:15 nbi10206 sshd[7247]: Received disconnect from 192.144.232.49 port 37692:11: Bye Bye [preauth]
Jun 16 00:05:15 nbi10206 sshd[7247]: Disconnected from 192.144.232.49 port 37692 [preauth]
Jun 16 00:18:51 nbi10206 sshd[20310]: User r.r from 192.144.232.49 not allowed because not listed in AllowUsers
Jun 16 00:18:51 nbi10206 sshd[20310]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.232.49  user=r.r
Jun 16 00:18:53 nbi10206 sshd[20310]: Failed password for invalid user r.r from 192.144.232.49 port 48310 ssh2
Jun 16 00:18:53 nbi10206 sshd[20310]: Received disconnect from 192.144.232.49 port 48310:11: Bye Bye [preauth]
Jun 16 00:18:53 nbi10206 sshd[20310]: Disconnected from 192.144.232.49 port 48310 [preauth]
Jun 16 00:2........
-------------------------------
2020-06-16 06:48:20
72.191.197.154 attackspam
tcp 445
2020-06-16 06:27:24

Recently Reported IPs

5.78.222.58 69.157.64.46 177.145.19.169 124.78.213.100
165.146.126.73 66.83.80.129 179.32.191.239 193.4.107.63
51.8.160.128 58.62.45.18 188.165.110.192 83.159.18.30
153.182.84.233 207.99.46.29 183.16.232.33 174.117.158.142
46.214.45.164 60.238.140.151 179.176.24.42 60.165.106.218