Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 216.113.59.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44753
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;216.113.59.148.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022401 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 25 13:21:32 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 148.59.113.216.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 148.59.113.216.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.13.35.212 attack
Nov 16 17:22:03 server sshd\[10087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.35.212  user=root
Nov 16 17:22:05 server sshd\[10087\]: Failed password for root from 106.13.35.212 port 48722 ssh2
Nov 16 17:38:37 server sshd\[14128\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.35.212  user=root
Nov 16 17:38:39 server sshd\[14128\]: Failed password for root from 106.13.35.212 port 47772 ssh2
Nov 16 17:44:04 server sshd\[15714\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.35.212  user=root
...
2019-11-17 06:25:04
138.185.136.145 attackspam
Nov 16 19:42:04 web1 sshd\[13375\]: Invalid user daniellacunha from 138.185.136.145
Nov 16 19:42:04 web1 sshd\[13375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.185.136.145
Nov 16 19:42:06 web1 sshd\[13375\]: Failed password for invalid user daniellacunha from 138.185.136.145 port 39724 ssh2
Nov 16 19:46:22 web1 sshd\[13585\]: Invalid user spy from 138.185.136.145
Nov 16 19:46:22 web1 sshd\[13585\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.185.136.145
2019-11-17 06:36:48
124.235.138.239 attackspambots
Server penetration trying other domain names than server publicly serves (ex https://localhost)
2019-11-17 06:50:57
52.176.110.203 attack
2019-11-16T15:55:07.512143shield sshd\[27469\]: Invalid user sriniuas from 52.176.110.203 port 50954
2019-11-16T15:55:07.516297shield sshd\[27469\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.176.110.203
2019-11-16T15:55:09.512797shield sshd\[27469\]: Failed password for invalid user sriniuas from 52.176.110.203 port 50954 ssh2
2019-11-16T15:59:35.022836shield sshd\[28734\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=52.176.110.203  user=root
2019-11-16T15:59:37.340490shield sshd\[28734\]: Failed password for root from 52.176.110.203 port 41817 ssh2
2019-11-17 06:45:25
157.230.228.62 attack
Nov 16 19:01:11 hosting sshd[22976]: Invalid user godgod from 157.230.228.62 port 45312
...
2019-11-17 06:28:38
70.65.174.69 attack
SSH bruteforce
2019-11-17 06:30:20
113.172.0.111 attack
Nov 16 16:08:27 master sshd[7425]: Failed password for invalid user admin from 113.172.0.111 port 48613 ssh2
2019-11-17 06:51:56
149.56.141.193 attack
Nov 16 10:05:34 hpm sshd\[5704\]: Invalid user stamos from 149.56.141.193
Nov 16 10:05:34 hpm sshd\[5704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.ip-149-56-141.net
Nov 16 10:05:36 hpm sshd\[5704\]: Failed password for invalid user stamos from 149.56.141.193 port 46544 ssh2
Nov 16 10:09:12 hpm sshd\[6085\]: Invalid user ts from 149.56.141.193
Nov 16 10:09:12 hpm sshd\[6085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.ip-149-56-141.net
2019-11-17 06:27:10
117.4.201.77 attackspam
Brute forcing RDP port 3389
2019-11-17 06:22:02
81.24.82.69 attackbotsspam
A spam email was sent from this SMTP server. This kind of spam emails had the following features.:
- They attempted to camouflage the SMTP server with a KDDI's legitimate server. 
- The domain of URLs in the messages was best-self.info (103.212.223.59).
2019-11-17 06:30:01
91.158.202.101 attackspambots
Nov 16 17:03:04 cavern sshd[8766]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.158.202.101
2019-11-17 06:25:37
110.35.173.100 attackspam
Nov 16 16:39:26 cvbnet sshd[11993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.35.173.100 
Nov 16 16:39:28 cvbnet sshd[11993]: Failed password for invalid user macmillan from 110.35.173.100 port 45341 ssh2
...
2019-11-17 07:00:05
106.245.160.140 attack
Nov 17 03:49:35 vibhu-HP-Z238-Microtower-Workstation sshd\[24018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.160.140  user=root
Nov 17 03:49:37 vibhu-HP-Z238-Microtower-Workstation sshd\[24018\]: Failed password for root from 106.245.160.140 port 53346 ssh2
Nov 17 03:53:30 vibhu-HP-Z238-Microtower-Workstation sshd\[24281\]: Invalid user burchell from 106.245.160.140
Nov 17 03:53:30 vibhu-HP-Z238-Microtower-Workstation sshd\[24281\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.245.160.140
Nov 17 03:53:32 vibhu-HP-Z238-Microtower-Workstation sshd\[24281\]: Failed password for invalid user burchell from 106.245.160.140 port 33176 ssh2
...
2019-11-17 06:58:08
89.248.171.173 attackbotsspam
Nov 16 16:31:47 web1 postfix/smtpd[14721]: warning: unknown[89.248.171.173]: SASL LOGIN authentication failed: authentication failure
...
2019-11-17 06:52:27
41.211.112.195 attackspam
Fail2Ban Ban Triggered
2019-11-17 06:48:37

Recently Reported IPs

44.47.27.73 12.8.247.51 186.222.53.35 124.210.154.99
21.182.130.39 47.95.68.191 55.19.26.44 30.77.117.168
132.110.59.56 83.131.221.91 113.46.74.242 147.115.1.145
64.53.40.13 45.136.137.99 128.245.96.80 52.107.175.47
20.37.62.12 85.125.187.115 52.39.209.163 128.163.64.121