Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Houston

Region: Texas

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.48.182.9
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35904
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.48.182.9.			IN	A

;; AUTHORITY SECTION:
.			466	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020082501 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Aug 26 08:29:31 CST 2020
;; MSG SIZE  rcvd: 116
Host info
9.182.48.104.in-addr.arpa domain name pointer 104-48-182-9.lightspeed.hstntx.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
9.182.48.104.in-addr.arpa	name = 104-48-182-9.lightspeed.hstntx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
148.69.245.162 attack
Automatic report - Port Scan Attack
2019-10-17 12:56:34
222.186.190.92 attackbots
Oct 17 04:45:56 *** sshd[7943]: User root from 222.186.190.92 not allowed because not listed in AllowUsers
2019-10-17 12:56:03
80.255.130.197 attack
2019-10-17T04:49:34.081231abusebot-7.cloudsearch.cf sshd\[6600\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=sib-ecometall.ru  user=root
2019-10-17 13:03:53
196.32.194.90 attackbotsspam
Oct 17 07:05:52 jane sshd[4061]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.32.194.90 
Oct 17 07:05:54 jane sshd[4061]: Failed password for invalid user smtpuser from 196.32.194.90 port 50711 ssh2
...
2019-10-17 13:12:42
216.213.198.180 attack
Oct 17 05:52:56 MainVPS sshd[21875]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.213.198.180  user=root
Oct 17 05:52:58 MainVPS sshd[21875]: Failed password for root from 216.213.198.180 port 34930 ssh2
Oct 17 05:55:48 MainVPS sshd[22088]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.213.198.180  user=root
Oct 17 05:55:50 MainVPS sshd[22088]: Failed password for root from 216.213.198.180 port 41128 ssh2
Oct 17 05:58:58 MainVPS sshd[22307]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.213.198.180  user=root
Oct 17 05:58:59 MainVPS sshd[22307]: Failed password for root from 216.213.198.180 port 47400 ssh2
...
2019-10-17 13:05:45
2604:a880:400:d0::20:2001 attackbots
WordPress login Brute force / Web App Attack on client site.
2019-10-17 13:03:30
202.158.27.199 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-17 13:08:46
49.207.33.2 attack
Oct 17 06:27:53 minden010 sshd[15437]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.33.2
Oct 17 06:27:55 minden010 sshd[15437]: Failed password for invalid user Root1q2w3e from 49.207.33.2 port 41412 ssh2
Oct 17 06:32:02 minden010 sshd[21260]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.207.33.2
...
2019-10-17 13:04:37
212.237.31.228 attack
$f2bV_matches
2019-10-17 13:09:07
110.139.102.125 attackspam
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/110.139.102.125/ 
 ID - 1H : (52)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ID 
 NAME ASN : ASN7713 
 
 IP : 110.139.102.125 
 
 CIDR : 110.139.102.0/23 
 
 PREFIX COUNT : 2255 
 
 UNIQUE IP COUNT : 2765312 
 
 
 WYKRYTE ATAKI Z ASN7713 :  
  1H - 1 
  3H - 4 
  6H - 5 
 12H - 8 
 24H - 18 
 
 DateTime : 2019-10-17 05:56:08 
 
 INFO :  HACK ! - Looking for resource vulnerabilities Scan Detected and Blocked by ADMIN  - data recovery
2019-10-17 13:03:04
200.194.28.116 attackbotsspam
Oct 17 06:39:40 localhost sshd\[31723\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.194.28.116  user=root
Oct 17 06:39:42 localhost sshd\[31723\]: Failed password for root from 200.194.28.116 port 49112 ssh2
Oct 17 06:39:44 localhost sshd\[31723\]: Failed password for root from 200.194.28.116 port 49112 ssh2
2019-10-17 12:45:38
45.136.109.239 attack
Oct 17 05:24:09 h2177944 kernel: \[4158602.759427\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.239 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=9437 PROTO=TCP SPT=46285 DPT=5505 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 05:34:05 h2177944 kernel: \[4159198.699133\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.239 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=28537 PROTO=TCP SPT=46285 DPT=4106 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 05:40:15 h2177944 kernel: \[4159568.966240\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.239 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=55686 PROTO=TCP SPT=46285 DPT=8877 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 05:42:45 h2177944 kernel: \[4159718.631838\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.239 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=249 ID=56319 PROTO=TCP SPT=46285 DPT=3990 WINDOW=1024 RES=0x00 SYN URGP=0 
Oct 17 05:56:36 h2177944 kernel: \[4160549.556305\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=45.136.109.239 DST=85.214.1
2019-10-17 12:49:59
51.68.136.168 attackspam
Oct 16 18:25:48 php1 sshd\[20629\]: Invalid user turnkey from 51.68.136.168
Oct 16 18:25:48 php1 sshd\[20629\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.136.168
Oct 16 18:25:51 php1 sshd\[20629\]: Failed password for invalid user turnkey from 51.68.136.168 port 57052 ssh2
Oct 16 18:30:02 php1 sshd\[20989\]: Invalid user Pass123456789_ from 51.68.136.168
Oct 16 18:30:02 php1 sshd\[20989\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.136.168
2019-10-17 12:33:08
185.70.155.186 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/185.70.155.186/ 
 ES - 1H : (50)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : ES 
 NAME ASN : ASN56882 
 
 IP : 185.70.155.186 
 
 CIDR : 185.70.152.0/22 
 
 PREFIX COUNT : 8 
 
 UNIQUE IP COUNT : 4096 
 
 
 WYKRYTE ATAKI Z ASN56882 :  
  1H - 1 
  3H - 1 
  6H - 1 
 12H - 1 
 24H - 1 
 
 DateTime : 2019-10-17 05:56:26 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-17 12:54:31
92.207.166.44 attackbots
$f2bV_matches
2019-10-17 12:58:51

Recently Reported IPs

156.40.244.123 46.47.3.81 93.105.225.72 68.198.1.240
204.77.163.181 175.160.35.148 63.37.191.38 155.227.151.119
94.186.253.254 97.105.30.58 24.190.241.89 88.93.246.19
49.253.192.19 173.85.72.114 216.185.68.163 202.139.79.215
39.92.140.89 152.197.56.74 173.206.248.254 2.88.216.125