Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Columbus

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.148.201.70
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29843
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.148.201.70.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022000 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 19:11:25 CST 2025
;; MSG SIZE  rcvd: 105
Host info
70.201.148.3.in-addr.arpa domain name pointer ec2-3-148-201-70.us-east-2.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
70.201.148.3.in-addr.arpa	name = ec2-3-148-201-70.us-east-2.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
66.70.142.231 attackbots
Invalid user testing from 66.70.142.231 port 46402
2020-07-23 06:14:30
200.44.222.66 attackspambots
Attempted connection to port 445.
2020-07-23 05:50:39
111.229.171.244 attackbots
...
2020-07-23 05:43:53
94.231.103.127 attack
Attempt to access admin/ | Ignores robots.txt | User agent: Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0
2020-07-23 06:16:35
168.194.13.25 attack
SSH Invalid Login
2020-07-23 05:52:53
81.88.49.27 attack
Automatic report - XMLRPC Attack
2020-07-23 05:51:10
106.124.136.103 attack
Jul 22 16:40:14 PorscheCustomer sshd[1442]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.136.103
Jul 22 16:40:16 PorscheCustomer sshd[1442]: Failed password for invalid user bsp from 106.124.136.103 port 32895 ssh2
Jul 22 16:45:12 PorscheCustomer sshd[1589]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.124.136.103
...
2020-07-23 06:11:47
14.173.151.207 attackspambots
20/7/22@10:45:17: FAIL: Alarm-Network address from=14.173.151.207
...
2020-07-23 06:07:42
200.73.128.100 attack
SSH Invalid Login
2020-07-23 06:13:54
66.249.75.95 attackbots
Automatic report - Banned IP Access
2020-07-23 06:18:31
171.4.240.203 attack
Unauthorized connection attempt from IP address 171.4.240.203 on Port 445(SMB)
2020-07-23 06:11:01
113.21.127.167 attack
(imapd) Failed IMAP login from 113.21.127.167 (NC/New Caledonia/host-113-21-127-167.canl.nc): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: Jul 22 19:15:16 ir1 dovecot[3110802]: imap-login: Disconnected (auth failed, 1 attempts in 25 secs): user=, method=PLAIN, rip=113.21.127.167, lip=5.63.12.44, session=
2020-07-23 06:04:30
164.132.47.139 attackspam
SSH Invalid Login
2020-07-23 06:12:51
94.21.158.175 attackbotsspam
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-23 06:18:11
78.25.22.178 attackspambots
Port Scan
...
2020-07-23 05:45:55

Recently Reported IPs

202.19.232.174 220.114.1.160 213.43.70.17 98.80.82.230
137.93.85.233 243.116.102.209 190.142.136.142 88.233.192.162
120.47.90.143 154.57.192.161 188.86.67.105 128.59.89.150
79.145.208.18 90.194.152.75 232.111.185.203 35.212.8.134
15.176.229.93 232.237.14.147 106.2.55.179 122.156.35.17