Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Alba Iulia

Region: Alba

Country: Romania

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 46.214.65.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 64198
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;46.214.65.148.			IN	A

;; AUTHORITY SECTION:
.			599	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020702 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 08 08:08:01 CST 2022
;; MSG SIZE  rcvd: 106
Host info
148.65.214.46.in-addr.arpa domain name pointer 46-214-65-148.next-gen.ro.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.65.214.46.in-addr.arpa	name = 46-214-65-148.next-gen.ro.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
39.38.73.243 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 03:29:06,608 INFO [amun_request_handler] PortScan Detected on Port: 445 (39.38.73.243)
2019-07-11 15:35:32
202.72.221.226 attackbots
Brute force attempt
2019-07-11 15:26:12
139.59.39.174 attackspam
detected by Fail2Ban
2019-07-11 15:43:10
123.24.136.27 attackspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-11 05:52:52]
2019-07-11 15:17:07
218.92.0.204 attackspam
Failed password for root from 218.92.0.204 port 42367 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.204  user=root
Failed password for root from 218.92.0.204 port 46281 ssh2
Failed password for root from 218.92.0.204 port 46281 ssh2
Failed password for root from 218.92.0.204 port 46281 ssh2
2019-07-11 15:23:41
113.189.60.31 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 03:38:29,633 INFO [amun_request_handler] PortScan Detected on Port: 445 (113.189.60.31)
2019-07-11 15:15:21
177.99.172.87 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 03:30:50,006 INFO [amun_request_handler] PortScan Detected on Port: 445 (177.99.172.87)
2019-07-11 15:26:44
45.224.149.6 attackbots
Autoban   45.224.149.6 ABORTED AUTH
2019-07-11 15:05:34
203.206.163.19 attack
RDP Bruteforce
2019-07-11 14:51:29
125.46.34.154 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-11 15:03:08
177.8.250.161 attackspambots
failed_logins
2019-07-11 15:31:31
172.245.56.247 attackspambots
Reported by AbuseIPDB proxy server.
2019-07-11 15:08:12
14.170.40.94 attack
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-11 05:52:28]
2019-07-11 15:37:04
206.189.145.152 attackspambots
Jul 11 05:47:41 unicornsoft sshd\[478\]: Invalid user army from 206.189.145.152
Jul 11 05:47:41 unicornsoft sshd\[478\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=206.189.145.152
Jul 11 05:47:43 unicornsoft sshd\[478\]: Failed password for invalid user army from 206.189.145.152 port 32334 ssh2
2019-07-11 14:53:49
171.4.240.253 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-11 03:44:55,606 INFO [amun_request_handler] PortScan Detected on Port: 445 (171.4.240.253)
2019-07-11 15:04:31

Recently Reported IPs

59.95.66.199 112.232.142.82 120.85.91.72 5.143.237.244
5.234.168.89 52.128.40.82 124.156.226.177 37.76.196.149
117.87.55.166 81.215.25.117 45.247.119.135 180.188.243.90
80.174.160.27 42.224.212.207 197.57.204.93 170.80.49.163
94.232.43.14 36.37.123.6 183.89.185.132 109.236.52.26