Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 4.148.12.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57084
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;4.148.12.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 07:49:20 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 149.12.148.4.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.12.148.4.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
123.108.35.186 attack
(sshd) Failed SSH login from 123.108.35.186 (IN/India/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  6 07:18:07 ubnt-55d23 sshd[1299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.108.35.186  user=root
Apr  6 07:18:09 ubnt-55d23 sshd[1299]: Failed password for root from 123.108.35.186 port 44134 ssh2
2020-04-06 14:06:42
94.247.241.70 attackspam
email spam
2020-04-06 13:49:15
31.44.247.180 attackspambots
2020-04-06T05:40:26.878622homeassistant sshd[12921]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=31.44.247.180  user=root
2020-04-06T05:40:28.983080homeassistant sshd[12921]: Failed password for root from 31.44.247.180 port 42805 ssh2
...
2020-04-06 14:07:12
118.68.226.25 attack
fraudulent account repeated several times
2020-04-06 13:40:00
92.86.10.42 attack
spam
2020-04-06 13:31:53
41.162.125.226 attack
spam
2020-04-06 13:58:29
95.65.124.252 attackspambots
email spam
2020-04-06 13:31:06
103.221.254.73 attackspam
spam
2020-04-06 13:30:40
50.242.100.89 attackspam
spam
2020-04-06 13:55:43
109.252.255.162 attack
spam
2020-04-06 13:45:17
103.129.223.126 attackbotsspam
Attempted WordPress login: "GET /wp-login.php"
2020-04-06 14:11:00
83.142.197.99 attackspam
Apr  3 10:49:49 mail01 postfix/postscreen[29648]: CONNECT from [83.142.197.99]:49788 to [94.130.181.95]:25
Apr  3 10:49:49 mail01 postfix/dnsblog[29651]: addr 83.142.197.99 listed by domain zen.spamhaus.org as 127.0.0.3
Apr  3 10:49:49 mail01 postfix/dnsblog[29651]: addr 83.142.197.99 listed by domain zen.spamhaus.org as 127.0.0.4
Apr  3 10:49:49 mail01 postfix/dnsblog[29650]: addr 83.142.197.99 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Apr  3 10:49:49 mail01 postfix/dnsblog[29649]: addr 83.142.197.99 listed by domain bl.blocklist.de as 127.0.0.9
Apr  3 10:49:49 mail01 postfix/postscreen[29648]: PREGREET 41 after 0.22 from [83.142.197.99]:49788: EHLO 99.197.142.83.rev.metrointernet.pl

Apr  3 10:49:49 mail01 postfix/postscreen[29648]: DNSBL rank 5 for [83.142.197.99]:49788
Apr x@x
Apr x@x
Apr x@x
Apr  3 10:49:51 mail01 postfix/postscreen[29648]: HANGUP after 1.6 from [83.142.197.99]:49788 in tests after SMTP handshake
Apr  3 10:49:51 mail01 postfix/postscreen[29........
-------------------------------
2020-04-06 13:52:09
77.120.104.114 attackspam
spam
2020-04-06 13:53:57
185.188.218.10 attackspam
spam
2020-04-06 13:42:32
201.16.228.170 attackbots
spam
2020-04-06 13:36:53

Recently Reported IPs

77.213.201.16 8.25.109.106 180.85.36.190 87.56.99.187
33.58.254.54 170.93.208.192 231.184.235.194 5.184.145.222
101.200.4.5 39.4.134.7 65.16.181.239 202.204.89.102
214.12.187.110 47.160.44.94 253.185.13.141 225.190.19.145
130.239.1.57 58.211.24.156 209.15.106.109 63.108.176.112