Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Härnösand

Region: Västernorrland

Country: Sweden

Internet Service Provider: A3 Allmanna IT - och Telekomaktiebolaget (Publ) AB

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
DATE:2020-08-29 05:59:07, IP:87.241.105.148, PORT:telnet - Telnet brute force auth on a honeypot server (epe-dc)
2020-08-29 12:52:38
attackspambots
Unauthorized connection attempt detected from IP address 87.241.105.148 to port 23 [J]
2020-01-13 02:04:34
attackspambots
87.241.105.148 was recorded 16 times by 1 hosts attempting to connect to the following ports: 23. Incident counter (4h, 24h, all-time): 16, 42, 42
2019-11-07 17:37:12
attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/87.241.105.148/ 
 SE - 1H : (211)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : SE 
 NAME ASN : ASN45011 
 
 IP : 87.241.105.148 
 
 CIDR : 87.241.96.0/19 
 
 PREFIX COUNT : 101 
 
 UNIQUE IP COUNT : 526592 
 
 
 WYKRYTE ATAKI Z ASN45011 :  
  1H - 4 
  3H - 20 
  6H - 60 
 12H - 75 
 24H - 75 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-09-24 02:04:35
Comments on same subnet:
IP Type Details Datetime
87.241.105.71 attack
SE_ALLTELE-SE-MNT_<177>1591272454 [1:2403462:57764] ET CINS Active Threat Intelligence Poor Reputation IP TCP group 82 [Classification: Misc Attack] [Priority: 2]:  {TCP} 87.241.105.71:18082
2020-06-04 22:30:16
87.241.105.71 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2020-03-04 16:02:58
87.241.105.71 attackbotsspam
Unauthorized connection attempt detected from IP address 87.241.105.71 to port 23 [J]
2020-03-03 01:14:05
87.241.105.71 attackbotsspam
Unauthorized connection attempt detected from IP address 87.241.105.71 to port 23 [J]
2020-01-31 02:37:55
87.241.105.71 attackspam
Unauthorized connection attempt detected from IP address 87.241.105.71 to port 2323 [J]
2020-01-27 02:23:28
87.241.105.71 attackspam
Unauthorized connection attempt detected from IP address 87.241.105.71 to port 23 [J]
2020-01-06 15:48:01
87.241.105.71 attackbots
ET CINS Active Threat Intelligence Poor Reputation IP group 79 - port: 23 proto: TCP cat: Misc Attack
2019-12-11 05:25:22
87.241.105.71 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 82 - port: 23 proto: TCP cat: Misc Attack
2019-11-06 06:35:53
87.241.105.71 attack
Telnet Server BruteForce Attack
2019-09-03 17:41:38
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 87.241.105.148
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28314
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;87.241.105.148.			IN	A

;; AUTHORITY SECTION:
.			489	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019092300 1800 900 604800 86400

;; Query time: 37 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Sep 24 02:04:29 CST 2019
;; MSG SIZE  rcvd: 118
Host info
148.105.241.87.in-addr.arpa domain name pointer h87-241-105-148.cust.a3fiber.se.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
148.105.241.87.in-addr.arpa	name = h87-241-105-148.cust.a3fiber.se.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
5.253.17.160 attack
Invalid user user1 from 5.253.17.160 port 44894
2020-01-18 04:16:16
51.91.159.46 attackbots
(sshd) Failed SSH login from 51.91.159.46 (FR/France/-/-/46.ip-51-91-159.eu/[AS16276 OVH SAS]): 1 in the last 3600 secs
2020-01-18 04:13:16
151.29.189.160 attack
Invalid user pi from 151.29.189.160 port 40450
2020-01-18 04:28:51
80.227.12.38 attackspambots
Unauthorized connection attempt detected from IP address 80.227.12.38 to port 2220 [J]
2020-01-18 04:43:28
200.59.52.181 attackbots
Invalid user admin from 200.59.52.181 port 48488
2020-01-18 04:19:14
122.252.239.5 attackspam
Unauthorized connection attempt detected from IP address 122.252.239.5 to port 2220 [J]
2020-01-18 04:34:46
134.209.63.140 attackbots
Unauthorized connection attempt detected from IP address 134.209.63.140 to port 2220 [J]
2020-01-18 04:32:57
5.135.185.27 attackbotsspam
SSH Brute-Force reported by Fail2Ban
2020-01-18 04:16:30
124.239.216.233 attackbotsspam
Jan 17 19:11:25 MK-Soft-VM4 sshd[10112]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.239.216.233 
Jan 17 19:11:28 MK-Soft-VM4 sshd[10112]: Failed password for invalid user abner from 124.239.216.233 port 46398 ssh2
...
2020-01-18 04:34:04
107.189.11.193 attackbots
Invalid user fake from 107.189.11.193 port 42396
2020-01-18 04:39:31
123.20.229.142 attackbotsspam
Invalid user admin from 123.20.229.142 port 45507
2020-01-18 04:34:17
197.52.210.220 attackspambots
Invalid user admin from 197.52.210.220 port 52684
2020-01-18 04:20:23
78.139.216.117 attack
Invalid user tmp from 78.139.216.117 port 60690
2020-01-18 04:10:40
37.192.170.184 attackspambots
Invalid user admin from 37.192.170.184 port 44848
2020-01-18 04:46:40
209.182.218.137 attackspambots
Invalid user admin from 209.182.218.137 port 41732
2020-01-18 04:17:52

Recently Reported IPs

105.145.23.26 217.225.19.27 203.202.252.104 187.50.245.98
78.37.178.202 109.186.229.200 81.92.207.77 69.68.140.48
223.5.61.242 148.239.244.42 165.234.74.246 17.154.247.109
208.210.156.152 173.104.76.45 110.194.135.238 80.164.119.135
182.50.151.53 137.94.74.158 61.224.137.136 173.17.78.55