Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Portugal

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
109.48.170.29 attackbotsspam
scan z
2020-03-25 15:58:52
109.48.170.29 attackbots
Unauthorized connection attempt detected from IP address 109.48.170.29 to port 22 [J]
2020-01-25 00:32:54
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 109.48.17.2
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 57290
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;109.48.17.2.			IN	A

;; AUTHORITY SECTION:
.			557	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011001 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 03:40:43 CST 2022
;; MSG SIZE  rcvd: 104
Host info
2.17.48.109.in-addr.arpa domain name pointer a109-48-17-2.cpe.netcabo.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
2.17.48.109.in-addr.arpa	name = a109-48-17-2.cpe.netcabo.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
78.128.113.116 attackspam
Aug  7 16:56:20 mail.srvfarm.net postfix/smtpd[3436957]: warning: unknown[78.128.113.116]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  7 16:56:20 mail.srvfarm.net postfix/smtpd[3436957]: lost connection after AUTH from unknown[78.128.113.116]
Aug  7 16:56:25 mail.srvfarm.net postfix/smtpd[3437212]: lost connection after AUTH from unknown[78.128.113.116]
Aug  7 16:56:29 mail.srvfarm.net postfix/smtpd[3437888]: lost connection after AUTH from unknown[78.128.113.116]
Aug  7 16:56:34 mail.srvfarm.net postfix/smtpd[3436957]: lost connection after AUTH from unknown[78.128.113.116]
2020-08-07 23:15:55
159.203.63.125 attack
2020-08-07T14:09:39.389632amanda2.illicoweb.com sshd\[44512\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.63.125  user=root
2020-08-07T14:09:41.923398amanda2.illicoweb.com sshd\[44512\]: Failed password for root from 159.203.63.125 port 47332 ssh2
2020-08-07T14:11:53.618232amanda2.illicoweb.com sshd\[44802\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.63.125  user=root
2020-08-07T14:11:54.877824amanda2.illicoweb.com sshd\[44802\]: Failed password for root from 159.203.63.125 port 40971 ssh2
2020-08-07T14:14:03.955292amanda2.illicoweb.com sshd\[45259\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.203.63.125  user=root
...
2020-08-07 23:47:50
178.90.190.166 attackspam
1596801944 - 08/07/2020 14:05:44 Host: 178.90.190.166/178.90.190.166 Port: 23 TCP Blocked
...
2020-08-07 23:14:36
87.233.223.184 attackbots
xmlrpc attack
2020-08-07 23:34:58
45.43.36.191 attackspambots
Aug  7 16:15:30 rocket sshd[7427]: Failed password for root from 45.43.36.191 port 45546 ssh2
Aug  7 16:20:03 rocket sshd[7888]: Failed password for root from 45.43.36.191 port 57052 ssh2
...
2020-08-07 23:25:17
112.196.54.35 attackspam
(sshd) Failed SSH login from 112.196.54.35 (IN/India/-): 5 in the last 3600 secs
2020-08-07 23:20:08
182.38.124.193 attackspam
Aug  7 10:08:37 garuda postfix/smtpd[4086]: connect from unknown[182.38.124.193]
Aug  7 10:08:37 garuda postfix/smtpd[4161]: connect from unknown[182.38.124.193]
Aug  7 10:08:38 garuda postfix/smtpd[4161]: warning: unknown[182.38.124.193]: SASL LOGIN authentication failed: authentication failure
Aug  7 10:08:39 garuda postfix/smtpd[4161]: lost connection after AUTH from unknown[182.38.124.193]
Aug  7 10:08:39 garuda postfix/smtpd[4161]: disconnect from unknown[182.38.124.193] ehlo=1 auth=0/1 commands=1/2
Aug  7 10:08:39 garuda postfix/smtpd[4161]: connect from unknown[182.38.124.193]
Aug  7 10:08:40 garuda postfix/smtpd[4161]: warning: unknown[182.38.124.193]: SASL LOGIN authentication failed: authentication failure
Aug  7 10:08:41 garuda postfix/smtpd[4161]: lost connection after AUTH from unknown[182.38.124.193]
Aug  7 10:08:41 garuda postfix/smtpd[4161]: disconnect from unknown[182.38.124.193] ehlo=1 auth=0/1 commands=1/2
Aug  7 10:08:42 garuda postfix/smtpd[4161]: c........
-------------------------------
2020-08-07 23:21:52
114.67.166.50 attackbotsspam
Lines containing failures of 114.67.166.50
Aug  3 22:02:27 shared06 sshd[18000]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.166.50  user=r.r
Aug  3 22:02:29 shared06 sshd[18000]: Failed password for r.r from 114.67.166.50 port 55802 ssh2
Aug  3 22:02:30 shared06 sshd[18000]: Received disconnect from 114.67.166.50 port 55802:11: Bye Bye [preauth]
Aug  3 22:02:30 shared06 sshd[18000]: Disconnected from authenticating user r.r 114.67.166.50 port 55802 [preauth]
Aug  3 22:12:26 shared06 sshd[21480]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=114.67.166.50  user=r.r
Aug  3 22:12:28 shared06 sshd[21480]: Failed password for r.r from 114.67.166.50 port 41314 ssh2
Aug  3 22:12:28 shared06 sshd[21480]: Received disconnect from 114.67.166.50 port 41314:11: Bye Bye [preauth]
Aug  3 22:12:28 shared06 sshd[21480]: Disconnected from authenticating user r.r 114.67.166.50 port 41314 [preauth........
------------------------------
2020-08-07 23:09:18
129.211.123.97 attackspam
Port Scan/VNC login attempt
...
2020-08-07 23:28:29
103.85.17.131 attackbotsspam
1596801916 - 08/07/2020 14:05:16 Host: 103.85.17.131/103.85.17.131 Port: 445 TCP Blocked
...
2020-08-07 23:38:18
209.141.40.237 attackbotsspam
Aug  7 16:07:38 fhem-rasp sshd[11019]: Invalid user !@12Qwaszx from 209.141.40.237 port 34680
...
2020-08-07 23:30:42
201.156.169.109 attackspambots
Automatic report - Banned IP Access
2020-08-07 23:32:35
178.33.216.187 attackspam
Aug  7 14:05:08 fhem-rasp sshd[23839]: Failed password for root from 178.33.216.187 port 59009 ssh2
Aug  7 14:05:08 fhem-rasp sshd[23839]: Disconnected from authenticating user root 178.33.216.187 port 59009 [preauth]
...
2020-08-07 23:45:06
104.248.122.143 attackspam
scans once in preceeding hours on the ports (in chronological order) 3173 resulting in total of 3 scans from 104.248.0.0/16 block.
2020-08-07 23:28:53
92.222.77.150 attack
2020-08-07T14:01:08.311992amanda2.illicoweb.com sshd\[43059\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.ip-92-222-77.eu  user=root
2020-08-07T14:01:10.359654amanda2.illicoweb.com sshd\[43059\]: Failed password for root from 92.222.77.150 port 60872 ssh2
2020-08-07T14:03:33.733029amanda2.illicoweb.com sshd\[43555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.ip-92-222-77.eu  user=root
2020-08-07T14:03:35.685433amanda2.illicoweb.com sshd\[43555\]: Failed password for root from 92.222.77.150 port 53560 ssh2
2020-08-07T14:05:19.964848amanda2.illicoweb.com sshd\[43851\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.ip-92-222-77.eu  user=root
...
2020-08-07 23:37:22

Recently Reported IPs

254.169.37.243 119.128.164.239 19.115.154.4 141.240.221.140
186.155.242.131 166.90.69.9 193.32.188.90 103.248.60.140
15.7.116.127 101.198.173.248 122.180.136.97 58.177.116.89
178.22.180.50 172.163.242.252 158.197.135.96 158.104.76.62
167.252.250.109 54.124.166.11 151.141.98.159 189.251.2.164