Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Trier

Region: Rheinland-Pfalz

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 136.199.48.90
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32054
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;136.199.48.90.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:10:27 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 90.48.199.136.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 90.48.199.136.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
167.99.193.126 attackspambots
Jul  5 00:01:20 mxgate1 postfix/postscreen[27386]: CONNECT from [167.99.193.126]:51618 to [176.31.12.44]:25
Jul  5 00:01:20 mxgate1 postfix/dnsblog[27505]: addr 167.99.193.126 listed by domain zen.spamhaus.org as 127.0.0.4
Jul  5 00:01:20 mxgate1 postfix/dnsblog[27501]: addr 167.99.193.126 listed by domain cbl.abuseat.org as 127.0.0.2
Jul  5 00:01:20 mxgate1 postfix/dnsblog[27503]: addr 167.99.193.126 listed by domain ix.dnsbl.xxxxxx.net as 127.0.0.2
Jul  5 00:01:20 mxgate1 postfix/dnsblog[27502]: addr 167.99.193.126 listed by domain bl.spamcop.net as 127.0.0.2
Jul  5 00:01:20 mxgate1 postfix/dnsblog[27504]: addr 167.99.193.126 listed by domain b.barracudacentral.org as 127.0.0.2
Jul  5 00:01:26 mxgate1 postfix/postscreen[27386]: DNSBL rank 6 for [167.99.193.126]:51618
Jul x@x
Jul  5 00:01:26 mxgate1 postfix/postscreen[27386]: HANGUP after 0.13 from [167.99.193.126]:51618 in tests after SMTP handshake
Jul  5 00:01:26 mxgate1 postfix/postscreen[27386]: DISCONNECT [167.99........
-------------------------------
2019-07-08 07:46:44
60.2.201.80 attackbots
Lines containing failures of 60.2.201.80
Jul  2 07:50:05 hvs sshd[21980]: Invalid user mm3 from 60.2.201.80 port 3271
Jul  2 07:50:05 hvs sshd[21980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.2.201.80 
Jul  2 07:50:08 hvs sshd[21980]: Failed password for invalid user mm3 from 60.2.201.80 port 3271 ssh2
Jul  2 07:50:10 hvs sshd[21980]: Received disconnect from 60.2.201.80 port 3271:11: Bye Bye [preauth]
Jul  2 07:50:10 hvs sshd[21980]: Disconnected from invalid user mm3 60.2.201.80 port 3271 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=60.2.201.80
2019-07-08 07:31:53
92.242.255.49 attackbots
proto=tcp  .  spt=48721  .  dpt=25  .     (listed on Blocklist de  Jul 07)     (28)
2019-07-08 07:39:26
189.94.173.71 attack
Jun 25 23:02:43 localhost postfix/smtpd[21050]: disconnect from 189-94-173-71.3g.claro.net.br[189.94.173.71] ehlo=1 quhostname=1 commands=2
Jun 25 23:02:45 localhost postfix/smtpd[21050]: disconnect from 189-94-173-71.3g.claro.net.br[189.94.173.71] ehlo=1 quhostname=1 commands=2
Jun 25 23:02:48 localhost postfix/smtpd[21050]: disconnect from 189-94-173-71.3g.claro.net.br[189.94.173.71] ehlo=1 quhostname=1 commands=2
Jun 25 23:02:48 localhost postfix/smtpd[21050]: disconnect from 189-94-173-71.3g.claro.net.br[189.94.173.71] ehlo=1 quhostname=1 commands=2
Jun 25 23:02:49 localhost postfix/smtpd[21050]: disconnect from 189-94-173-71.3g.claro.net.br[189.94.173.71] ehlo=1 quhostname=1 commands=2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=189.94.173.71
2019-07-08 07:33:42
191.53.249.120 attack
smtp auth brute force
2019-07-08 07:17:42
181.226.40.34 attackspambots
WordPress XMLRPC scan :: 181.226.40.34 0.136 BYPASS [08/Jul/2019:09:14:39  1000] [censored_1] "GET /xmlrpc.php HTTP/1.1" 405 53 "-" "Mozilla/5.0 (X11; Linux i686; rv:2.0.1) Gecko/20100101 Firefox/4.0.1"
2019-07-08 07:32:44
178.140.140.13 attack
Jul  1 23:17:26 m3061 sshd[18069]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=broadband-178-140-140-13.ip.moscow.rt.ru  user=r.r
Jul  1 23:17:28 m3061 sshd[18069]: Failed password for r.r from 178.140.140.13 port 59506 ssh2
Jul  1 23:17:30 m3061 sshd[18069]: Failed password for r.r from 178.140.140.13 port 59506 ssh2


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=178.140.140.13
2019-07-08 07:27:57
181.40.73.86 attackbotsspam
Jul  8 00:24:11 cp sshd[26948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.73.86
Jul  8 00:24:11 cp sshd[26948]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.40.73.86
2019-07-08 07:16:33
177.244.2.221 attack
Jul  7 21:30:34 localhost sshd\[593\]: Invalid user postgres from 177.244.2.221 port 34730
Jul  7 21:30:34 localhost sshd\[593\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.244.2.221
Jul  7 21:30:37 localhost sshd\[593\]: Failed password for invalid user postgres from 177.244.2.221 port 34730 ssh2
Jul  7 21:33:13 localhost sshd\[606\]: Invalid user luat from 177.244.2.221 port 60582
2019-07-08 07:16:10
200.207.63.165 attackbotsspam
Jul  5 14:53:18 server6 sshd[26308]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-207-63-165.dsl.telesp.net.br
Jul  5 14:53:20 server6 sshd[26308]: Failed password for invalid user audrey from 200.207.63.165 port 40796 ssh2
Jul  5 14:53:20 server6 sshd[26308]: Received disconnect from 200.207.63.165: 11: Bye Bye [preauth]
Jul  5 18:07:22 server6 sshd[31679]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-207-63-165.dsl.telesp.net.br
Jul  5 18:07:25 server6 sshd[31679]: Failed password for invalid user web1 from 200.207.63.165 port 52717 ssh2
Jul  5 18:07:25 server6 sshd[31679]: Received disconnect from 200.207.63.165: 11: Bye Bye [preauth]
Jul  5 18:10:04 server6 sshd[1834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-207-63-165.dsl.telesp.net.br
Jul  5 18:10:06 server6 sshd[1834]: Failed password for invalid user admin from 200.207........
-------------------------------
2019-07-08 07:11:18
194.61.26.4 attackspambots
2019-07-07T23:14:42.120448abusebot-4.cloudsearch.cf sshd\[20961\]: Invalid user bananapi from 194.61.26.4 port 27444
2019-07-08 07:30:59
194.99.106.148 attackspambots
/?l=page_view&p=advanced_search,
Mozilla/5.0 (Windows; U; Windows NT 2.0) Gecko/20091201 Firefox/3.5.6 GTB5
2019-07-08 07:04:17
185.176.26.29 attack
ZTE Router Exploit Scanner
2019-07-08 07:34:20
79.72.10.213 attackbots
Attempted to connect 3 times to port 23 TCP
2019-07-08 07:21:04
67.205.153.16 attack
2019-07-08T00:43:31.856086  sshd[31858]: Invalid user servers from 67.205.153.16 port 36068
2019-07-08T00:43:31.872369  sshd[31858]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=67.205.153.16
2019-07-08T00:43:31.856086  sshd[31858]: Invalid user servers from 67.205.153.16 port 36068
2019-07-08T00:43:34.104423  sshd[31858]: Failed password for invalid user servers from 67.205.153.16 port 36068 ssh2
2019-07-08T00:46:44.414279  sshd[31907]: Invalid user l from 67.205.153.16 port 45056
...
2019-07-08 07:11:47

Recently Reported IPs

185.37.118.40 34.224.79.243 173.197.175.141 93.169.170.9
230.40.76.54 180.2.17.3 149.124.221.117 72.1.7.236
26.97.0.198 196.148.216.142 59.151.187.175 210.17.6.75
131.41.216.213 147.183.159.74 169.132.69.79 115.141.232.208
237.100.73.110 114.165.144.38 235.97.103.36 246.121.187.253