Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.0.148.195
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.0.148.195.			IN	A

;; AUTHORITY SECTION:
.			467	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024040402 1800 900 604800 86400

;; Query time: 91 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Apr 05 07:41:08 CST 2024
;; MSG SIZE  rcvd: 104
Host info
195.148.0.3.in-addr.arpa domain name pointer ec2-3-0-148-195.ap-southeast-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
195.148.0.3.in-addr.arpa	name = ec2-3-0-148-195.ap-southeast-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
122.121.25.90 attackspambots
UTC: 2019-12-25 port: 23/tcp
2019-12-26 13:59:50
122.140.131.73 attackspam
UTC: 2019-12-25 port: 23/tcp
2019-12-26 14:02:44
103.89.168.196 attackbots
B: Magento admin pass test (abusive)
2019-12-26 14:15:40
125.41.135.22 attack
UTC: 2019-12-25 port: 23/tcp
2019-12-26 14:09:45
188.130.5.177 attackspam
Invalid user admin from 188.130.5.177 port 35698
2019-12-26 14:12:13
200.93.149.162 attack
Unauthorized connection attempt from IP address 200.93.149.162 on Port 445(SMB)
2019-12-26 14:04:32
80.82.77.139 attackbotsspam
12/26/2019-06:04:03.590861 80.82.77.139 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-12-26 14:05:01
114.39.0.115 attackspam
UTC: 2019-12-25 port: 23/tcp
2019-12-26 14:29:49
106.13.48.20 attackspam
Dec 26 07:19:05 sd-53420 sshd\[11508\]: User root from 106.13.48.20 not allowed because none of user's groups are listed in AllowGroups
Dec 26 07:19:05 sd-53420 sshd\[11508\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.20  user=root
Dec 26 07:19:07 sd-53420 sshd\[11508\]: Failed password for invalid user root from 106.13.48.20 port 38392 ssh2
Dec 26 07:22:03 sd-53420 sshd\[12687\]: User root from 106.13.48.20 not allowed because none of user's groups are listed in AllowGroups
Dec 26 07:22:03 sd-53420 sshd\[12687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.48.20  user=root
...
2019-12-26 14:25:50
204.42.253.130 attack
UTC: 2019-12-25 pkts: 2 port: 161/udp
2019-12-26 14:06:54
106.13.23.149 attackbotsspam
$f2bV_matches
2019-12-26 14:03:42
79.153.175.146 attackbots
Lines containing failures of 79.153.175.146
Dec 26 05:56:22 keyhelp sshd[4998]: Invalid user sapdb from 79.153.175.146 port 50380
Dec 26 05:56:22 keyhelp sshd[4998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.153.175.146
Dec 26 05:56:25 keyhelp sshd[4998]: Failed password for invalid user sapdb from 79.153.175.146 port 50380 ssh2
Dec 26 05:56:25 keyhelp sshd[4998]: Received disconnect from 79.153.175.146 port 50380:11: Bye Bye [preauth]
Dec 26 05:56:25 keyhelp sshd[4998]: Disconnected from invalid user sapdb 79.153.175.146 port 50380 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=79.153.175.146
2019-12-26 14:09:15
193.93.193.53 attackbotsspam
B: zzZZzz blocked content access
2019-12-26 14:14:40
222.186.175.169 attackbots
Dec 26 06:51:35 eventyay sshd[8209]: Failed password for root from 222.186.175.169 port 38544 ssh2
Dec 26 06:51:49 eventyay sshd[8209]: error: maximum authentication attempts exceeded for root from 222.186.175.169 port 38544 ssh2 [preauth]
Dec 26 06:52:03 eventyay sshd[8212]: Failed password for root from 222.186.175.169 port 38442 ssh2
...
2019-12-26 13:57:15
202.57.44.58 attack
Unauthorized connection attempt from IP address 202.57.44.58 on Port 445(SMB)
2019-12-26 14:45:57

Recently Reported IPs

3.8.40.239 1.15.24.175 1.236.247.8 1.234.23.159
2.10.160.90 1.202.21.228 1.203.174.125 2.24.246.103
2.56.51.243 2.56.56.94 2.56.72.32 2.56.72.101
2.56.72.91 2.56.72.94 2.56.72.72 2.56.72.36
2.56.72.20 2.56.72.35 2.56.72.15 2.56.72.6