Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Russian Federation

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.148.232.106 attackbotsspam
Forbidden access
2020-07-17 18:45:29
45.148.232.249 attackspam
Forbidden access
2020-07-17 04:28:40
45.148.232.27 attackbotsspam
fell into ViewStateTrap:Durban01
2020-02-09 03:20:15
45.148.232.38 attack
Registration form abuse
2019-12-12 20:22:49
45.148.232.94 attackbotsspam
45.148.232.94 - - [20/Oct/2019:08:03:49 -0400] "GET /?page=products&action=../../../etc/passwd%00&manufacturerID=12&productID=973&linkID=15902 HTTP/1.1" 200 17150 "https://newportbrassfaucets.com/?page=products&action=../../../etc/passwd%00&manufacturerID=12&productID=973&linkID=15902" "Mozilla/5.0 (Windows NT 10.0; Win64; x64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/76.0.3809.132 Safari/537.36"
...
2019-10-20 21:39:08
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.148.232.93
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25547
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.148.232.93.			IN	A

;; AUTHORITY SECTION:
.			343	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 01:11:20 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 93.232.148.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 93.232.148.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.16.37.135 attackspambots
2020-06-01T18:00:14.452052randservbullet-proofcloud-66.localdomain sshd[15468]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.16.37.135  user=root
2020-06-01T18:00:16.639240randservbullet-proofcloud-66.localdomain sshd[15468]: Failed password for root from 185.16.37.135 port 54156 ssh2
2020-06-01T18:08:27.408936randservbullet-proofcloud-66.localdomain sshd[15546]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.16.37.135  user=root
2020-06-01T18:08:29.275036randservbullet-proofcloud-66.localdomain sshd[15546]: Failed password for root from 185.16.37.135 port 54680 ssh2
...
2020-06-02 02:40:08
80.240.253.212 attack
Unauthorized connection attempt from IP address 80.240.253.212 on Port 445(SMB)
2020-06-02 02:45:20
213.142.156.248 attackbots
[01/Jun/2020 x@x
[01/Jun/2020 x@x
[01/Jun/2020 x@x


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=213.142.156.248
2020-06-02 03:02:57
117.4.153.199 attack
Unauthorized connection attempt from IP address 117.4.153.199 on Port 445(SMB)
2020-06-02 02:35:14
36.76.117.15 attackspambots
20/6/1@08:03:30: FAIL: Alarm-Network address from=36.76.117.15
20/6/1@08:03:30: FAIL: Alarm-Network address from=36.76.117.15
...
2020-06-02 03:02:29
37.151.158.158 attackspambots
Unauthorized connection attempt from IP address 37.151.158.158 on Port 445(SMB)
2020-06-02 02:55:27
178.128.41.141 attackspambots
Jun  1 19:37:10 ns382633 sshd\[3972\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.41.141  user=root
Jun  1 19:37:11 ns382633 sshd\[3972\]: Failed password for root from 178.128.41.141 port 57460 ssh2
Jun  1 19:41:33 ns382633 sshd\[4856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.41.141  user=root
Jun  1 19:41:36 ns382633 sshd\[4856\]: Failed password for root from 178.128.41.141 port 45950 ssh2
Jun  1 19:44:45 ns382633 sshd\[5119\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.41.141  user=root
2020-06-02 02:56:53
141.98.9.161 attack
Jun  1 20:28:46 haigwepa sshd[25019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.9.161 
Jun  1 20:28:48 haigwepa sshd[25019]: Failed password for invalid user admin from 141.98.9.161 port 34803 ssh2
...
2020-06-02 02:32:26
141.98.9.157 attackspam
SSH Brute-Force attacks
2020-06-02 02:47:31
118.180.251.9 attackbots
Jun  1 13:06:40 scw-6657dc sshd[29142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.180.251.9  user=root
Jun  1 13:06:40 scw-6657dc sshd[29142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.180.251.9  user=root
Jun  1 13:06:42 scw-6657dc sshd[29142]: Failed password for root from 118.180.251.9 port 36245 ssh2
...
2020-06-02 02:58:53
141.98.9.159 attack
Bruteforce detected by fail2ban
2020-06-02 02:43:32
139.59.43.196 attackspam
xmlrpc attack
2020-06-02 03:00:18
157.245.166.110 attackbotsspam
157.245.166.110 - - [01/Jun/2020:17:00:54 +0200] "POST /wp-login.php HTTP/1.1" 200 6971 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.166.110 - - [01/Jun/2020:19:51:18 +0200] "GET /wp-login.php HTTP/1.1" 200 6702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.245.166.110 - - [01/Jun/2020:19:51:22 +0200] "POST /wp-login.php HTTP/1.1" 200 6953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-06-02 03:01:37
189.16.233.194 attackspambots
Unauthorized connection attempt from IP address 189.16.233.194 on Port 445(SMB)
2020-06-02 02:53:31
213.4.45.152 attackbots
Unauthorized connection attempt from IP address 213.4.45.152 on Port 445(SMB)
2020-06-02 02:27:04

Recently Reported IPs

116.12.48.101 143.255.2.209 27.64.28.46 51.235.141.151
78.95.28.84 74.217.186.54 161.156.29.33 118.71.237.175
167.71.235.176 184.82.148.210 180.116.252.207 95.213.154.54
79.33.179.195 45.61.187.229 200.77.198.201 194.1.232.204
177.22.233.171 115.63.52.253 72.50.61.223 60.11.120.136