Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 5.148.161.200
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42959
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;5.148.161.200.			IN	A

;; AUTHORITY SECTION:
.			147	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011101 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 12 03:23:34 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 200.161.148.5.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 200.161.148.5.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
102.165.35.4 attackbotsspam
Host is trying to send e-mails. Unauthorized connection to tcp/25.
2019-07-03 02:14:18
46.105.30.20 attackspambots
2019-07-02T18:09:36.961262abusebot-6.cloudsearch.cf sshd\[21953\]: Invalid user ron from 46.105.30.20 port 41740
2019-07-03 02:19:33
221.214.138.53 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-07-03 01:53:57
37.238.131.154 attackspam
Trying to deliver email spam, but blocked by RBL
2019-07-03 02:40:32
191.96.253.115 attackbotsspam
0,77-05/05 concatform PostRequest-Spammer scoring: wien2018
2019-07-03 02:28:53
80.48.191.129 attack
NAME : AGMAR-NET CIDR : 80.48.191.128/25 DDoS attack Poland - block certain countries :) IP: 80.48.191.129  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-07-03 01:59:44
134.209.53.220 attack
Automatic report - Web App Attack
2019-07-03 02:33:37
217.64.42.229 attackbots
217.64.42.229 - - [02/Jul/2019:15:44:51 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:52 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:52 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:53 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:53 +0200] "GET /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
217.64.42.229 - - [02/Jul/2019:15:44:53 +0200] "POST /wp-login.php HTTP/1.1" 200 4404 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2019-07-03 02:29:57
159.65.236.58 attackbots
Jul  2 18:31:27 mail sshd\[14635\]: Invalid user password from 159.65.236.58 port 59824
Jul  2 18:31:27 mail sshd\[14635\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.236.58
...
2019-07-03 02:27:54
121.153.12.239 attackspambots
Jul  1 21:43:00 pi01 sshd[26252]: Connection from 121.153.12.239 port 48698 on 192.168.1.10 port 22
Jul  1 21:43:02 pi01 sshd[26252]: Invalid user 12345 from 121.153.12.239 port 48698
Jul  1 21:43:02 pi01 sshd[26252]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.153.12.239
Jul  1 21:43:05 pi01 sshd[26252]: Failed password for invalid user 12345 from 121.153.12.239 port 48698 ssh2
Jul  1 21:43:05 pi01 sshd[26252]: Connection closed by 121.153.12.239 port 48698 [preauth]
Jul  1 21:54:47 pi01 sshd[26575]: Connection from 121.153.12.239 port 51040 on 192.168.1.10 port 22
Jul  1 21:54:48 pi01 sshd[26575]: Invalid user 111 from 121.153.12.239 port 51040
Jul  1 21:54:48 pi01 sshd[26575]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.153.12.239
Jul  1 21:54:51 pi01 sshd[26575]: Failed password for invalid user 111 from 121.153.12.239 port 51040 ssh2
Jul  1 21:54:51 pi01 sshd[26575]: Con........
-------------------------------
2019-07-03 02:25:29
118.24.5.163 attackspam
Jul  2 15:46:21 vps691689 sshd[20773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.5.163
Jul  2 15:46:23 vps691689 sshd[20773]: Failed password for invalid user svk from 118.24.5.163 port 44654 ssh2
...
2019-07-03 02:04:12
212.22.79.241 attackspambots
[portscan] Port scan
2019-07-03 02:06:50
34.92.174.32 attack
$f2bV_matches
2019-07-03 01:57:37
128.199.136.129 attackspam
Jul  2 18:35:26 ns37 sshd[19704]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.136.129
Jul  2 18:35:28 ns37 sshd[19704]: Failed password for invalid user bridget from 128.199.136.129 port 43060 ssh2
Jul  2 18:42:37 ns37 sshd[20130]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.136.129
2019-07-03 02:11:07
79.60.18.222 attackspambots
Automatic report - Web App Attack
2019-07-03 02:03:30

Recently Reported IPs

218.220.202.165 223.104.254.152 140.103.176.146 68.36.126.245
38.78.174.247 60.124.232.177 89.183.108.213 70.130.116.66
30.193.69.218 112.142.156.3 8.63.182.74 90.192.158.212
61.48.234.125 160.205.153.151 33.110.92.208 209.102.26.53
241.90.58.141 69.208.120.102 235.9.153.154 251.238.197.143