Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 141.160.18.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 47921
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;141.160.18.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 01:02:19 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 48.18.160.141.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.18.160.141.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.100.87.247 attack
185.100.87.247 - - [09/Jun/2020:06:55:23 +0300] "GET /nmaplowercheck1591674922 HTTP/1.0" 403 1460 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
185.100.87.247 - - [09/Jun/2020:06:55:23 +0300] "GET /HNAP1 HTTP/1.0" 403 1460 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
185.100.87.247 - - [09/Jun/2020:06:55:23 +0300] "HEAD / HTTP/1.0" 403 287 "-" "Mozilla/5.0 (Windows NT 6.1) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/36.0.1985.125 Safari/537.36"
...
2020-06-09 13:58:48
106.13.27.156 attackspambots
prod6
...
2020-06-09 14:26:19
91.232.96.106 attack
2020-06-09T05:54:45+02:00  exim[16903]: [1\53] 1jiVLY-0004Od-1z H=(oval.bahisgir.com) [91.232.96.106] F= rejected after DATA: This message scored 104.5 spam points.
2020-06-09 14:18:07
186.213.21.254 attackspambots
Lines containing failures of 186.213.21.254
Jun  8 11:46:30 kopano sshd[17980]: warning: /etc/hosts.allow, line 13: can't verify hostname: getaddrinfo(186.213.21.254.static.host.gvt.net.br, AF_INET) failed
Jun  8 11:46:32 kopano sshd[17980]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.213.21.254  user=r.r
Jun  8 11:46:34 kopano sshd[17980]: Failed password for r.r from 186.213.21.254 port 49932 ssh2
Jun  8 11:46:34 kopano sshd[17980]: Received disconnect from 186.213.21.254 port 49932:11: Bye Bye [preauth]
Jun  8 11:46:34 kopano sshd[17980]: Disconnected from authenticating user r.r 186.213.21.254 port 49932 [preauth]
Jun  8 11:50:09 kopano sshd[20455]: warning: /etc/hosts.allow, line 13: can't verify hostname: getaddrinfo(186.213.21.254.static.host.gvt.net.br, AF_INET) failed
Jun  8 11:50:11 kopano sshd[20455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.213.21.254  user=r.r
........
------------------------------
2020-06-09 13:57:26
51.83.44.53 attackbots
prod6
...
2020-06-09 14:26:36
106.13.84.192 attack
Failed password for invalid user pw from 106.13.84.192 port 43392 ssh2
2020-06-09 14:30:22
180.76.176.174 attack
Jun  9 05:55:05 sso sshd[16744]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.176.174
Jun  9 05:55:07 sso sshd[16744]: Failed password for invalid user faithe from 180.76.176.174 port 51170 ssh2
...
2020-06-09 14:14:41
138.219.129.150 attackspam
DATE:2020-06-09 08:00:47, IP:138.219.129.150, PORT:ssh SSH brute force auth (docker-dc)
2020-06-09 14:28:43
134.209.185.162 attack
" "
2020-06-09 14:29:49
74.81.161.5 attack
Port Scan detected!
...
2020-06-09 14:23:38
176.144.97.52 attackspam
Bruteforce detected by fail2ban
2020-06-09 14:37:02
118.89.108.152 attackspambots
Jun  9 07:56:20 ift sshd\[35175\]: Invalid user wangxt from 118.89.108.152Jun  9 07:56:22 ift sshd\[35175\]: Failed password for invalid user wangxt from 118.89.108.152 port 34230 ssh2Jun  9 07:57:16 ift sshd\[35213\]: Invalid user deployer from 118.89.108.152Jun  9 07:57:18 ift sshd\[35213\]: Failed password for invalid user deployer from 118.89.108.152 port 45848 ssh2Jun  9 07:58:20 ift sshd\[35246\]: Failed password for root from 118.89.108.152 port 57472 ssh2
...
2020-06-09 14:01:43
189.38.186.223 attackspambots
2020-06-09T07:12:32.986852lavrinenko.info sshd[16122]: Failed password for root from 189.38.186.223 port 38956 ssh2
2020-06-09T07:16:53.245871lavrinenko.info sshd[16290]: Invalid user gogs from 189.38.186.223 port 39548
2020-06-09T07:16:53.254980lavrinenko.info sshd[16290]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=189.38.186.223
2020-06-09T07:16:53.245871lavrinenko.info sshd[16290]: Invalid user gogs from 189.38.186.223 port 39548
2020-06-09T07:16:55.599444lavrinenko.info sshd[16290]: Failed password for invalid user gogs from 189.38.186.223 port 39548 ssh2
...
2020-06-09 14:07:37
112.85.42.237 attackspambots
Jun  9 01:48:20 NPSTNNYC01T sshd[29038]: Failed password for root from 112.85.42.237 port 55626 ssh2
Jun  9 01:49:17 NPSTNNYC01T sshd[29116]: Failed password for root from 112.85.42.237 port 29659 ssh2
Jun  9 01:49:19 NPSTNNYC01T sshd[29116]: Failed password for root from 112.85.42.237 port 29659 ssh2
...
2020-06-09 14:03:37
186.90.132.106 attack
20/6/8@23:54:56: FAIL: Alarm-Network address from=186.90.132.106
20/6/8@23:54:56: FAIL: Alarm-Network address from=186.90.132.106
...
2020-06-09 14:20:10

Recently Reported IPs

147.141.91.144 248.193.86.95 193.42.0.49 139.201.4.90
29.240.41.243 84.118.219.2 34.94.224.157 90.137.229.96
249.225.145.135 138.122.83.135 68.118.107.159 186.34.11.160
189.0.3.90 150.98.192.73 192.102.236.119 122.113.8.40
207.168.133.199 41.194.18.184 114.4.196.21 48.208.36.233