Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 131.48.245.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51074
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;131.48.245.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 12:09:25 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 49.245.48.131.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 131.48.245.49.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
183.89.212.184 attackbots
Invalid user nagesh from 183.89.212.184 port 57346
2019-07-28 03:39:12
120.92.20.197 attackbotsspam
Invalid user humanity from 120.92.20.197 port 39443
2019-07-28 03:51:17
118.99.103.12 attackspam
Invalid user UBNT from 118.99.103.12 port 62887
2019-07-28 03:51:44
47.91.90.132 attackbots
Invalid user bB123456789 from 47.91.90.132 port 57308
2019-07-28 03:59:05
126.117.69.142 attackbots
Invalid user paSSWORD from 126.117.69.142 port 39772
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.117.69.142
Failed password for invalid user paSSWORD from 126.117.69.142 port 39772 ssh2
Invalid user xX123456789 from 126.117.69.142 port 36464
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=126.117.69.142
2019-07-28 03:49:38
200.125.188.82 attackspam
Invalid user lock from 200.125.188.82 port 22437
2019-07-28 03:36:23
14.41.77.225 attackspam
Invalid user Woodland from 14.41.77.225 port 55094
2019-07-28 04:02:37
106.75.97.206 attackbots
Invalid user etabeta from 106.75.97.206 port 59996
2019-07-28 03:23:39
106.13.106.46 attackbotsspam
Invalid user 41 from 106.13.106.46 port 48514
2019-07-28 03:24:13
182.253.66.122 attackbotsspam
Invalid user UBNT from 182.253.66.122 port 58761
2019-07-28 03:39:51
121.160.198.198 attackspambots
SSH Bruteforce Attack
2019-07-28 03:21:49
109.23.149.175 attackbotsspam
Invalid user pi from 109.23.149.175 port 48292
2019-07-28 03:23:09
211.24.155.116 attackspambots
Jul 27 17:50:57 marvibiene sshd[21494]: Invalid user hadoop from 211.24.155.116 port 47332
Jul 27 17:50:57 marvibiene sshd[21494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.24.155.116
Jul 27 17:50:57 marvibiene sshd[21494]: Invalid user hadoop from 211.24.155.116 port 47332
Jul 27 17:50:59 marvibiene sshd[21494]: Failed password for invalid user hadoop from 211.24.155.116 port 47332 ssh2
...
2019-07-28 03:33:36
181.28.250.240 attack
Invalid user test from 181.28.250.240 port 56235
2019-07-28 03:41:55
117.1.117.114 attackspam
Invalid user admin from 117.1.117.114 port 47615
2019-07-28 03:52:08

Recently Reported IPs

49.31.200.172 133.250.80.220 14.128.128.54 57.95.206.103
210.162.84.253 139.42.153.81 119.241.25.86 36.151.119.181
36.240.75.174 49.53.187.62 91.95.51.195 151.202.1.100
24.240.10.193 151.11.50.62 41.0.10.10 37.75.26.243
67.77.235.4 5.181.124.214 155.115.80.187 141.120.60.75