Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.148.10.247 botsattack
45.148.10.247/Trojan Linux
2025-11-19 14:09:00
45.148.10.241 attack
DDoS Inbound
2023-11-15 18:54:04
45.148.10.28 attackspam
Oct 13 20:18:40 sshgateway sshd\[2360\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28  user=root
Oct 13 20:18:43 sshgateway sshd\[2360\]: Failed password for root from 45.148.10.28 port 40178 ssh2
Oct 13 20:19:07 sshgateway sshd\[2364\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.28  user=root
2020-10-14 02:28:44
45.148.10.15 attackspambots
Bruteforce detected by fail2ban
2020-10-13 21:25:53
45.148.10.186 attackspam
Unable to negotiate with 45.148.10.186 port 47964: no matching key exchange method found. Their offer: diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1,diffie-hellman-group1-sha1 [preauth]
2020-10-13 21:24:21
45.148.10.28 attackbotsspam
SSH Server Abuse (45.148.10.28 as ): 
...
2020-10-13 17:43:00
45.148.10.15 attackbotsspam
Oct 13 05:18:03 server2 sshd\[31409\]: Invalid user user from 45.148.10.15
Oct 13 05:18:48 server2 sshd\[31424\]: Invalid user server from 45.148.10.15
Oct 13 05:19:33 server2 sshd\[31465\]: Invalid user steam from 45.148.10.15
Oct 13 05:20:17 server2 sshd\[31678\]: Invalid user vmware from 45.148.10.15
Oct 13 05:21:00 server2 sshd\[31685\]: Invalid user microsoft from 45.148.10.15
Oct 13 05:21:44 server2 sshd\[31730\]: Invalid user cloud from 45.148.10.15
2020-10-13 12:52:46
45.148.10.186 attackspam
Oct 13 05:33:03 ns308116 sshd[11001]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
Oct 13 05:33:05 ns308116 sshd[11001]: Failed password for root from 45.148.10.186 port 41866 ssh2
Oct 13 05:33:38 ns308116 sshd[11016]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
Oct 13 05:33:40 ns308116 sshd[11016]: Failed password for root from 45.148.10.186 port 39380 ssh2
Oct 13 05:34:15 ns308116 sshd[11027]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.186  user=root
...
2020-10-13 12:50:57
45.148.10.15 attack
Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15
Oct 12 23:36:06 srv-ubuntu-dev3 sshd[31523]: Invalid user user from 45.148.10.15
Oct 12 23:36:08 srv-ubuntu-dev3 sshd[31523]: Failed password for invalid user user from 45.148.10.15 port 40704 ssh2
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.148.10.15
Oct 12 23:36:38 srv-ubuntu-dev3 sshd[31590]: Invalid user 123Diego from 45.148.10.15
Oct 12 23:36:40 srv-ubuntu-dev3 sshd[31590]: Failed password for invalid user 123Diego from 45.148.10.15 port 59760 ssh2
Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: Invalid user Alphanetworks from 45.148.10.15
Oct 12 23:37:17 srv-ubuntu-dev3 sshd[31656]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rh
...
2020-10-13 05:40:39
45.148.10.186 attack
Fail2Ban
2020-10-13 05:39:02
45.148.10.15 attackbotsspam
Fail2Ban
2020-10-12 05:52:51
45.148.10.65 attackbots
Invalid user ubuntu from 45.148.10.65 port 43138
2020-10-12 05:36:52
45.148.10.15 attack
Brute force attempt
2020-10-11 21:59:38
45.148.10.65 attackspam
Oct 01 10:49:15 host sshd[12378]: Invalid user ubuntu from 45.148.10.65 port 41060
2020-10-11 21:43:21
45.148.10.28 attack
Fail2Ban automatic report:
SSH brute-force:
2020-10-11 21:05:28
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.148.10.124
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59600
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.148.10.124.			IN	A

;; AUTHORITY SECTION:
.			375	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024080900 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Aug 09 20:49:10 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 124.10.148.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 124.10.148.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
195.228.79.79 attackspam
Automatic report - XMLRPC Attack
2020-01-14 03:35:07
103.70.68.118 attack
Honeypot attack, port: 445, PTR: host-118.winetmedia.net.
2020-01-14 03:15:01
37.150.179.40 attack
Honeypot attack, port: 445, PTR: 37.150.179.40.megaline.telecom.kz.
2020-01-14 03:02:58
111.235.65.226 attackbotsspam
20/1/13@08:04:18: FAIL: Alarm-Network address from=111.235.65.226
...
2020-01-14 02:57:46
212.143.73.75 attackspam
Unauthorized connection attempt from IP address 212.143.73.75 on Port 445(SMB)
2020-01-14 02:58:45
113.173.180.151 attackbotsspam
Jan 13 13:44:13 h2022099 sshd[825]: Address 113.173.180.151 maps to static.vnpt.vn, but this does not map back to the address - POSSIBLE BREAK-IN ATTEMPT!
Jan 13 13:44:13 h2022099 sshd[825]: Invalid user admin from 113.173.180.151
Jan 13 13:44:13 h2022099 sshd[825]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=113.173.180.151 
Jan 13 13:44:15 h2022099 sshd[825]: Failed password for invalid user admin from 113.173.180.151 port 55963 ssh2
Jan 13 13:44:16 h2022099 sshd[825]: Connection closed by 113.173.180.151 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=113.173.180.151
2020-01-14 03:33:08
185.220.101.25 attack
Unauthorized connection attempt detected from IP address 185.220.101.25 to port 7800
2020-01-14 03:15:56
190.206.228.181 attack
Honeypot attack, port: 445, PTR: 190-206-228-181.dyn.dsl.cantv.net.
2020-01-14 02:55:10
201.20.113.97 attack
Unauthorized connection attempt detected from IP address 201.20.113.97 to port 80 [J]
2020-01-14 03:25:07
120.25.164.148 attackbots
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 03:12:57
52.187.135.29 attackspambots
k+ssh-bruteforce
2020-01-14 03:23:10
81.22.45.85 attack
ET DROP Dshield Block Listed Source group 1 - port: 3382 proto: TCP cat: Misc Attack
2020-01-14 03:08:15
105.112.115.239 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-14 02:58:12
193.32.182.228 attackbots
Automatic report - Port Scan Attack
2020-01-14 03:28:01
103.142.10.245 attack
Honeypot attack, port: 445, PTR: 245-10-142-103.KISPL.com.
2020-01-14 03:34:06

Recently Reported IPs

104.28.221.34 188.64.106.146 23.225.221.1 39.128.6.255
23.225.156.154 111.190.150.8 128.199.174.220 23.225.223.69
139.133.237.209 111.190.150.101 88.157.45.113 149.102.143.80
23.225.156.219 157.240.17.17 101.153.176.34 168.235.206.167
180.124.37.227 111.190.150.203 23.225.156.10 95.104.255.222