Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Amsterdam

Region: Noord Holland

Country: The Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 52.148.211.243
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 38817
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;52.148.211.243.			IN	A

;; AUTHORITY SECTION:
.			298	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024042300 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Apr 23 15:01:42 CST 2024
;; MSG SIZE  rcvd: 107
Host info
Host 243.211.148.52.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 243.211.148.52.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.196.225.45 attackspambots
Failed password for invalid user graciela from 5.196.225.45 port 40062 ssh2
Invalid user admin from 5.196.225.45 port 49102
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.225.45
Failed password for invalid user admin from 5.196.225.45 port 49102 ssh2
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=5.196.225.45  user=root
2019-11-15 18:17:03
103.114.107.149 attack
Nov 15 13:24:18 lcl-usvr-02 sshd[11397]: Invalid user support from 103.114.107.149 port 65407
...
2019-11-15 18:41:12
129.213.96.241 attack
Nov 15 07:19:21 heissa sshd\[9598\]: Invalid user corzani from 129.213.96.241 port 44480
Nov 15 07:19:21 heissa sshd\[9598\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.96.241
Nov 15 07:19:23 heissa sshd\[9598\]: Failed password for invalid user corzani from 129.213.96.241 port 44480 ssh2
Nov 15 07:24:44 heissa sshd\[10482\]: Invalid user frankel from 129.213.96.241 port 64931
Nov 15 07:24:44 heissa sshd\[10482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.213.96.241
2019-11-15 18:27:09
49.88.112.76 attack
Nov 15 11:28:36 * sshd[21871]: Failed password for root from 49.88.112.76 port 57388 ssh2
2019-11-15 18:34:16
45.162.99.126 attackspambots
Automatic report - Port Scan Attack
2019-11-15 18:18:01
92.63.194.17 attack
[portscan] tcp/3389 [MS RDP]
*(RWIN=1024)(11151214)
2019-11-15 18:29:30
125.88.177.12 attack
Nov 15 10:29:27 vpn01 sshd[27279]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.88.177.12
Nov 15 10:29:29 vpn01 sshd[27279]: Failed password for invalid user wwwrun from 125.88.177.12 port 7250 ssh2
...
2019-11-15 18:14:21
85.214.60.200 attackbots
Fail2Ban Ban Triggered
2019-11-15 18:19:36
1.53.115.157 attack
Brute force SMTP login attempts.
2019-11-15 18:24:49
178.128.93.63 attackbots
Automatic report - Banned IP Access
2019-11-15 18:48:15
36.89.93.233 attackbotsspam
Nov 15 10:30:08 nextcloud sshd\[18298\]: Invalid user pizzato from 36.89.93.233
Nov 15 10:30:08 nextcloud sshd\[18298\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.93.233
Nov 15 10:30:10 nextcloud sshd\[18298\]: Failed password for invalid user pizzato from 36.89.93.233 port 33156 ssh2
...
2019-11-15 18:23:55
216.245.196.222 attackspam
SIP:5060 - unauthorized VoIP call to 006478079632 using sipcli/v1.8
2019-11-15 18:52:53
183.89.212.93 attack
$f2bV_matches
2019-11-15 18:30:52
37.187.22.227 attackspam
Nov 15 11:01:58 lnxmysql61 sshd[11152]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=37.187.22.227
2019-11-15 18:16:25
118.89.221.36 attack
Nov 15 05:57:04 firewall sshd[15869]: Invalid user lisa from 118.89.221.36
Nov 15 05:57:05 firewall sshd[15869]: Failed password for invalid user lisa from 118.89.221.36 port 39351 ssh2
Nov 15 06:01:28 firewall sshd[15972]: Invalid user antons from 118.89.221.36
...
2019-11-15 18:22:49

Recently Reported IPs

52.137.45.22 52.148.211.24 183.129.167.10 185.198.69.222
191.235.118.208 45.93.20.142 47.104.196.29 71.6.232.23
185.155.234.182 39.43.156.64 156.248.92.36 154.93.17.164
23.247.137.37 97.195.20.234 149.40.50.177 123.241.167.192
84.252.95.136 103.188.234.102 243.51.87.86 223.205.221.113