Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.148.69.150
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50126
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.148.69.150.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031302 1800 900 604800 86400

;; Query time: 274 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 14 02:38:33 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 150.69.148.56.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 56.148.69.150.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
162.243.139.166 attackspambots
Port scan: Attack repeated for 24 hours
2020-05-30 06:23:44
58.221.44.224 attackbots
Port probing on unauthorized port 81
2020-05-30 06:30:50
112.85.42.173 attack
May 30 00:46:59 minden010 sshd[15753]: Failed password for root from 112.85.42.173 port 62408 ssh2
May 30 00:47:02 minden010 sshd[15753]: Failed password for root from 112.85.42.173 port 62408 ssh2
May 30 00:47:12 minden010 sshd[15753]: Failed password for root from 112.85.42.173 port 62408 ssh2
May 30 00:47:12 minden010 sshd[15753]: error: maximum authentication attempts exceeded for root from 112.85.42.173 port 62408 ssh2 [preauth]
...
2020-05-30 06:51:39
188.166.109.87 attackspam
2020-05-29 20:19:53,458 fail2ban.actions        [937]: NOTICE  [sshd] Ban 188.166.109.87
2020-05-29 20:58:55,823 fail2ban.actions        [937]: NOTICE  [sshd] Ban 188.166.109.87
2020-05-29 21:34:22,441 fail2ban.actions        [937]: NOTICE  [sshd] Ban 188.166.109.87
2020-05-29 22:09:43,566 fail2ban.actions        [937]: NOTICE  [sshd] Ban 188.166.109.87
2020-05-29 22:49:23,199 fail2ban.actions        [937]: NOTICE  [sshd] Ban 188.166.109.87
...
2020-05-30 06:32:49
166.252.82.107 attackbots
Automatic report - Port Scan Attack
2020-05-30 06:33:06
180.167.195.167 attackspambots
SASL PLAIN auth failed: ruser=...
2020-05-30 06:30:35
101.89.197.232 attack
Invalid user nelu from 101.89.197.232 port 39808
2020-05-30 06:56:23
59.127.162.229 attackspam
Port Scan detected!
...
2020-05-30 06:56:39
59.120.34.55 attackspambots
Port probing on unauthorized port 23
2020-05-30 06:45:04
14.29.204.213 attackbotsspam
349. On May 29 2020 experienced a Brute Force SSH login attempt -> 1 unique times by 14.29.204.213.
2020-05-30 06:39:23
106.7.251.145 attack
May 29 15:49:02 mailman postfix/smtpd[1859]: warning: unknown[106.7.251.145]: SASL PLAIN authentication failed: authentication failure
2020-05-30 06:51:57
157.245.91.72 attack
May 29 07:56:18 : SSH login attempts with invalid user
2020-05-30 06:45:36
106.52.42.153 attack
k+ssh-bruteforce
2020-05-30 06:35:27
200.44.50.155 attackbots
2020-05-29T20:48:39.743304abusebot-6.cloudsearch.cf sshd[8784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.44.50.155  user=root
2020-05-29T20:48:42.191966abusebot-6.cloudsearch.cf sshd[8784]: Failed password for root from 200.44.50.155 port 37384 ssh2
2020-05-29T20:51:47.841526abusebot-6.cloudsearch.cf sshd[8998]: Invalid user admin from 200.44.50.155 port 32940
2020-05-29T20:51:47.848429abusebot-6.cloudsearch.cf sshd[8998]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.44.50.155
2020-05-29T20:51:47.841526abusebot-6.cloudsearch.cf sshd[8998]: Invalid user admin from 200.44.50.155 port 32940
2020-05-29T20:51:50.106195abusebot-6.cloudsearch.cf sshd[8998]: Failed password for invalid user admin from 200.44.50.155 port 32940 ssh2
2020-05-29T20:54:51.562564abusebot-6.cloudsearch.cf sshd[9154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.44.50.155  us
...
2020-05-30 06:40:37
58.211.96.188 attackspam
port scan and connect, tcp 1433 (ms-sql-s)
2020-05-30 06:25:39

Recently Reported IPs

151.133.255.150 205.98.227.12 198.156.50.198 63.134.247.62
117.30.218.122 178.224.128.95 252.175.13.161 39.61.32.2
189.73.125.183 182.194.98.227 221.125.74.200 203.228.249.25
45.129.13.203 113.49.122.229 60.71.228.35 252.247.199.218
152.94.189.105 156.142.115.241 96.248.70.188 214.245.97.92