Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Denmark

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 62.242.148.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30210
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;62.242.148.135.			IN	A

;; AUTHORITY SECTION:
.			182	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 48 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 05:44:14 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 135.148.242.62.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.148.242.62.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
47.74.148.22 attackbotsspam
Invalid user grandma from 47.74.148.22 port 39680
2019-08-01 02:50:08
118.163.193.82 attackbotsspam
Invalid user oracle from 118.163.193.82 port 60013
2019-08-01 02:14:05
36.152.17.37 attackspam
Invalid user www from 36.152.17.37 port 50250
2019-08-01 02:05:14
51.68.123.192 attackbots
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.192
Failed password for invalid user sshserver from 51.68.123.192 port 43074 ssh2
Invalid user yunhui from 51.68.123.192 port 42310
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.123.192
Failed password for invalid user yunhui from 51.68.123.192 port 42310 ssh2
2019-08-01 02:49:35
172.93.96.58 attackspambots
Jul 31 14:01:34 sshgateway sshd\[21434\]: Invalid user nfsnobody from 172.93.96.58
Jul 31 14:01:34 sshgateway sshd\[21434\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.93.96.58
Jul 31 14:01:36 sshgateway sshd\[21434\]: Failed password for invalid user nfsnobody from 172.93.96.58 port 39396 ssh2
2019-08-01 01:56:15
217.125.110.139 attackbotsspam
Jul 31 14:35:39 localhost sshd\[6097\]: Invalid user web1 from 217.125.110.139 port 39734
Jul 31 14:35:39 localhost sshd\[6097\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.125.110.139
...
2019-08-01 02:25:16
122.114.168.143 attack
Invalid user sille from 122.114.168.143 port 42620
2019-08-01 02:34:31
122.114.253.197 attackbotsspam
Tried sshing with brute force.
2019-08-01 02:12:57
73.137.130.75 attackbotsspam
'Fail2Ban'
2019-08-01 02:18:24
51.68.46.156 attackbotsspam
Jul 31 17:59:40 bouncer sshd\[19563\]: Invalid user eclipse from 51.68.46.156 port 36246
Jul 31 17:59:40 bouncer sshd\[19563\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.46.156 
Jul 31 17:59:42 bouncer sshd\[19563\]: Failed password for invalid user eclipse from 51.68.46.156 port 36246 ssh2
...
2019-08-01 02:20:27
193.188.22.188 attackspambots
kp-sea2-01 recorded 2 login violations from 193.188.22.188 and was blocked at 2019-07-31 18:25:45. 193.188.22.188 has been blocked on 1 previous occasions. 193.188.22.188's first attempt was recorded at 2019-07-28 18:22:48
2019-08-01 02:40:52
192.42.116.25 attackspam
Automatic report - Banned IP Access
2019-08-01 02:08:47
159.65.54.221 attackspam
SSH authentication failure x 6 reported by Fail2Ban
...
2019-08-01 02:43:02
51.75.170.13 attackbots
Jul 30 07:52:51 linuxrulz sshd[18463]: Invalid user job from 51.75.170.13 port 36464
Jul 30 07:52:51 linuxrulz sshd[18463]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.170.13
Jul 30 07:52:53 linuxrulz sshd[18463]: Failed password for invalid user job from 51.75.170.13 port 36464 ssh2
Jul 30 07:52:53 linuxrulz sshd[18463]: Connection closed by 51.75.170.13 port 36464 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=51.75.170.13
2019-08-01 02:48:59
129.204.76.157 attackspambots
Jul  6 18:48:47 dallas01 sshd[18326]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.76.157
Jul  6 18:48:48 dallas01 sshd[18326]: Failed password for invalid user ftpuser from 129.204.76.157 port 59548 ssh2
Jul  6 18:51:15 dallas01 sshd[18739]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.76.157
2019-08-01 02:34:03

Recently Reported IPs

198.238.191.204 212.144.124.167 184.211.151.95 29.21.178.92
62.28.222.63 129.204.134.154 38.48.159.79 63.149.179.103
79.130.44.215 171.244.189.182 82.28.30.117 249.239.90.133
56.11.183.160 179.167.126.174 57.119.206.53 223.105.201.59
236.239.69.169 239.62.117.115 217.99.61.36 159.83.86.195