Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 208.130.99.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50490
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;208.130.99.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022400 1800 900 604800 86400

;; Query time: 8 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 24 17:44:50 CST 2025
;; MSG SIZE  rcvd: 107
Host info
b'Host 148.99.130.208.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 208.130.99.148.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
189.251.140.113 attackspambots
Unauthorized connection attempt from IP address 189.251.140.113 on Port 445(SMB)
2020-07-15 19:24:22
147.135.253.94 attack
[2020-07-15 07:24:47] NOTICE[1150] chan_sip.c: Registration from '' failed for '147.135.253.94:51958' - Wrong password
[2020-07-15 07:24:47] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-15T07:24:47.951-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="758",SessionID="0x7fcb4c0aaa48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/147.135.253.94/51958",Challenge="58ac98b8",ReceivedChallenge="58ac98b8",ReceivedHash="ea07f7a6728667cdb6c6e805f656f6d0"
[2020-07-15 07:25:54] NOTICE[1150] chan_sip.c: Registration from '' failed for '147.135.253.94:49289' - Wrong password
[2020-07-15 07:25:54] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-15T07:25:54.077-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="759",SessionID="0x7fcb4c2700b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/147.135.253.94
...
2020-07-15 19:28:06
185.143.73.58 attack
Jul 15 13:34:28 s1 postfix/submission/smtpd\[3066\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 13:34:58 s1 postfix/submission/smtpd\[3066\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 13:35:28 s1 postfix/submission/smtpd\[23745\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 13:35:56 s1 postfix/submission/smtpd\[23745\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 13:36:23 s1 postfix/submission/smtpd\[23745\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 13:36:51 s1 postfix/submission/smtpd\[23745\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 13:37:18 s1 postfix/submission/smtpd\[3066\]: warning: unknown\[185.143.73.58\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Jul 15 13:37:46 s1 postfix/submission/smtpd\[23745\]: warning: unknown\[185
2020-07-15 19:44:38
52.188.158.119 attackbotsspam
SSH brutforce
2020-07-15 19:40:21
104.43.165.219 attack
Jul 15 13:13:23 ns381471 sshd[30844]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.43.165.219
Jul 15 13:13:25 ns381471 sshd[30844]: Failed password for invalid user admin from 104.43.165.219 port 56260 ssh2
2020-07-15 19:43:09
59.126.213.80 attack
Honeypot attack, port: 81, PTR: 59-126-213-80.HINET-IP.hinet.net.
2020-07-15 19:30:37
104.248.153.158 attackspam
Jul 15 08:17:51 firewall sshd[31249]: Invalid user privoxy from 104.248.153.158
Jul 15 08:17:53 firewall sshd[31249]: Failed password for invalid user privoxy from 104.248.153.158 port 52260 ssh2
Jul 15 08:21:16 firewall sshd[31381]: Invalid user python from 104.248.153.158
...
2020-07-15 19:32:51
92.0.6.244 attackbotsspam
1594810739 - 07/15/2020 12:58:59 Host: 92.0.6.244/92.0.6.244 Port: 445 TCP Blocked
2020-07-15 19:58:11
218.104.225.140 attackbotsspam
2020-07-15T10:53:05.666603abusebot-4.cloudsearch.cf sshd[21845]: Invalid user martin from 218.104.225.140 port 6579
2020-07-15T10:53:05.672692abusebot-4.cloudsearch.cf sshd[21845]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.225.140
2020-07-15T10:53:05.666603abusebot-4.cloudsearch.cf sshd[21845]: Invalid user martin from 218.104.225.140 port 6579
2020-07-15T10:53:07.577981abusebot-4.cloudsearch.cf sshd[21845]: Failed password for invalid user martin from 218.104.225.140 port 6579 ssh2
2020-07-15T11:00:26.720429abusebot-4.cloudsearch.cf sshd[22037]: Invalid user user from 218.104.225.140 port 31774
2020-07-15T11:00:26.726319abusebot-4.cloudsearch.cf sshd[22037]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.104.225.140
2020-07-15T11:00:26.720429abusebot-4.cloudsearch.cf sshd[22037]: Invalid user user from 218.104.225.140 port 31774
2020-07-15T11:00:28.174721abusebot-4.cloudsearch.cf sshd[22
...
2020-07-15 19:40:35
110.78.81.18 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-07-15 19:42:48
188.6.64.248 attack
Invalid user giannina from 188.6.64.248 port 60826
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=bc0640f8.dsl.pool.telekom.hu
Invalid user giannina from 188.6.64.248 port 60826
Failed password for invalid user giannina from 188.6.64.248 port 60826 ssh2
Invalid user oracle from 188.6.64.248 port 57670
2020-07-15 19:40:57
49.83.50.24 attackspam
FTP/21 MH Probe, BF, Hack -
2020-07-15 19:33:25
176.32.188.242 attackbotsspam
Unauthorized connection attempt from IP address 176.32.188.242 on Port 445(SMB)
2020-07-15 19:22:06
201.42.41.233 attackbots
Automatic report - Port Scan Attack
2020-07-15 19:29:36
89.37.187.0 attack
Unauthorized connection attempt from IP address 89.37.187.0 on Port 445(SMB)
2020-07-15 19:27:23

Recently Reported IPs

182.214.98.88 204.74.180.76 63.71.170.56 222.40.174.117
135.28.38.250 66.204.192.135 169.227.139.5 241.164.170.147
245.179.225.194 5.1.226.135 188.241.233.71 136.15.128.169
93.52.85.69 48.118.153.70 38.187.41.107 58.107.247.29
117.158.6.118 215.60.185.202 57.123.241.108 4.93.199.50