Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Duluth

Region: Minnesota

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: University of Minnesota

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.212.90.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3126
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;131.212.90.48.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019090200 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Sep 03 00:44:10 CST 2019
;; MSG SIZE  rcvd: 117
Host info
48.90.212.131.in-addr.arpa domain name pointer dyn-131-212-90-48.d.umn.edu.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
48.90.212.131.in-addr.arpa	name = dyn-131-212-90-48.d.umn.edu.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
125.135.113.195 attackbotsspam
Tries to login WordPress (wp-login.php)
2020-02-11 01:51:51
138.117.88.157 attackspambots
Honeypot attack, port: 445, PTR: 138-117-88-157.comfibra.com.br.
2020-02-11 01:55:18
183.82.0.15 attackspambots
$f2bV_matches
2020-02-11 01:59:16
132.232.132.103 attackspam
Feb 10 18:30:08 markkoudstaal sshd[8944]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.132.103
Feb 10 18:30:10 markkoudstaal sshd[8944]: Failed password for invalid user bkf from 132.232.132.103 port 57098 ssh2
Feb 10 18:34:45 markkoudstaal sshd[9743]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.132.103
2020-02-11 02:01:25
213.138.73.250 attackspambots
Feb 10 18:56:09 sd-53420 sshd\[2882\]: Invalid user wak from 213.138.73.250
Feb 10 18:56:09 sd-53420 sshd\[2882\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.138.73.250
Feb 10 18:56:11 sd-53420 sshd\[2882\]: Failed password for invalid user wak from 213.138.73.250 port 36365 ssh2
Feb 10 18:59:58 sd-53420 sshd\[3215\]: Invalid user yff from 213.138.73.250
Feb 10 18:59:58 sd-53420 sshd\[3215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.138.73.250
...
2020-02-11 02:22:41
202.98.213.218 attack
Feb 10 11:30:49 ws22vmsma01 sshd[138473]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.98.213.218
Feb 10 11:30:50 ws22vmsma01 sshd[138473]: Failed password for invalid user ovv from 202.98.213.218 port 34083 ssh2
...
2020-02-11 01:56:04
203.110.166.51 attackspambots
$f2bV_matches
2020-02-11 01:53:55
82.230.17.122 attack
Feb 10 14:39:25 [snip] sshd[20178]: Invalid user cys from 82.230.17.122 port 39916
Feb 10 14:39:25 [snip] sshd[20178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=82.230.17.122
Feb 10 14:39:27 [snip] sshd[20178]: Failed password for invalid user cys from 82.230.17.122 port 39916 ssh2[...]
2020-02-11 01:45:46
77.42.76.189 attackbotsspam
trying to access non-authorized port
2020-02-11 01:48:22
171.249.50.43 attackspam
ssh failed login
2020-02-11 02:16:02
103.120.224.222 attackbots
Feb 10 17:39:36 plex sshd[23634]: Invalid user nvo from 103.120.224.222 port 59554
2020-02-11 01:52:30
188.190.91.87 attackspambots
failed_logins
2020-02-11 02:03:56
203.125.145.58 attackspam
$f2bV_matches
2020-02-11 01:45:14
47.6.167.182 attack
Honeypot attack, port: 81, PTR: 047-006-167-182.res.spectrum.com.
2020-02-11 02:13:42
117.162.193.10 attack
Honeypot attack, port: 5555, PTR: localhost.
2020-02-11 01:38:59

Recently Reported IPs

209.238.152.199 109.187.101.101 1.106.127.69 200.127.162.42
218.28.234.3 135.225.30.224 52.129.173.228 181.80.239.212
216.139.208.215 41.99.133.152 155.212.86.0 188.93.21.223
156.223.16.227 68.142.253.243 209.124.130.248 216.220.19.110
115.5.166.107 164.139.41.206 12.78.137.91 55.144.157.95