Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.112.48.27
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21184
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.112.48.27.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012301 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 24 09:16:01 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 27.48.112.148.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 27.48.112.148.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
148.70.209.112 attackspam
Apr 10 08:16:10 host sshd[58605]: Invalid user admin from 148.70.209.112 port 38644
...
2020-04-10 14:28:24
139.59.94.24 attack
2020-04-10T03:55:28.578279abusebot-8.cloudsearch.cf sshd[2008]: Invalid user deluge from 139.59.94.24 port 53690
2020-04-10T03:55:28.585470abusebot-8.cloudsearch.cf sshd[2008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.94.24
2020-04-10T03:55:28.578279abusebot-8.cloudsearch.cf sshd[2008]: Invalid user deluge from 139.59.94.24 port 53690
2020-04-10T03:55:30.275914abusebot-8.cloudsearch.cf sshd[2008]: Failed password for invalid user deluge from 139.59.94.24 port 53690 ssh2
2020-04-10T04:01:23.755187abusebot-8.cloudsearch.cf sshd[2370]: Invalid user deploy from 139.59.94.24 port 39768
2020-04-10T04:01:23.762752abusebot-8.cloudsearch.cf sshd[2370]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.59.94.24
2020-04-10T04:01:23.755187abusebot-8.cloudsearch.cf sshd[2370]: Invalid user deploy from 139.59.94.24 port 39768
2020-04-10T04:01:25.523162abusebot-8.cloudsearch.cf sshd[2370]: Failed password 
...
2020-04-10 14:22:30
49.114.143.90 attack
SSH bruteforce
2020-04-10 14:08:57
45.254.26.90 attack
Unauthorized connection attempt detected from IP address 45.254.26.90 to port 5900
2020-04-10 13:51:54
181.63.248.149 attackbotsspam
Apr 10 08:05:46 vps647732 sshd[13814]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.63.248.149
Apr 10 08:05:48 vps647732 sshd[13814]: Failed password for invalid user uftp from 181.63.248.149 port 47966 ssh2
...
2020-04-10 14:15:44
51.91.120.67 attackspambots
Apr 10 06:23:24 localhost sshd[9281]: Invalid user admin from 51.91.120.67 port 42560
...
2020-04-10 13:56:21
118.25.111.153 attackspambots
Apr 10 05:27:39 ip-172-31-61-156 sshd[29481]: Invalid user hadoop from 118.25.111.153
Apr 10 05:27:39 ip-172-31-61-156 sshd[29481]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.111.153
Apr 10 05:27:39 ip-172-31-61-156 sshd[29481]: Invalid user hadoop from 118.25.111.153
Apr 10 05:27:41 ip-172-31-61-156 sshd[29481]: Failed password for invalid user hadoop from 118.25.111.153 port 36457 ssh2
Apr 10 05:30:43 ip-172-31-61-156 sshd[29621]: Invalid user student2 from 118.25.111.153
...
2020-04-10 13:50:56
208.113.198.175 attackbotsspam
Automatic report - XMLRPC Attack
2020-04-10 13:49:43
107.170.76.170 attack
$f2bV_matches
2020-04-10 14:11:46
13.67.51.182 attackbotsspam
Apr 10 01:41:11 vps46666688 sshd[9598]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=13.67.51.182
Apr 10 01:41:12 vps46666688 sshd[9598]: Failed password for invalid user user from 13.67.51.182 port 43850 ssh2
...
2020-04-10 14:27:29
182.61.33.145 attackspambots
(sshd) Failed SSH login from 182.61.33.145 (CN/China/-): 5 in the last 3600 secs
2020-04-10 13:50:39
111.229.143.161 attackbotsspam
Apr 10 07:21:00 v22018086721571380 sshd[13049]: Failed password for invalid user year from 111.229.143.161 port 44992 ssh2
2020-04-10 14:12:26
122.152.215.115 attackbots
Apr 10 06:50:33 nextcloud sshd\[24020\]: Invalid user autologin from 122.152.215.115
Apr 10 06:50:33 nextcloud sshd\[24020\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.152.215.115
Apr 10 06:50:35 nextcloud sshd\[24020\]: Failed password for invalid user autologin from 122.152.215.115 port 45852 ssh2
2020-04-10 13:47:11
106.75.95.80 attackspambots
Apr 10 04:55:34 scw-6657dc sshd[25733]: Failed password for mysql from 106.75.95.80 port 45492 ssh2
Apr 10 04:55:34 scw-6657dc sshd[25733]: Failed password for mysql from 106.75.95.80 port 45492 ssh2
Apr 10 04:59:37 scw-6657dc sshd[25886]: Invalid user postgres from 106.75.95.80 port 58740
...
2020-04-10 13:57:25
45.254.26.51 attackbots
Unauthorized connection attempt detected from IP address 45.254.26.51 to port 5900
2020-04-10 14:03:52

Recently Reported IPs

119.35.254.153 145.161.202.60 195.93.56.110 245.185.130.194
4.0.81.206 229.59.222.161 160.32.183.224 178.216.190.84
208.106.198.89 43.173.178.108 191.77.152.196 66.85.195.109
106.70.49.182 242.209.58.160 72.77.111.96 79.209.172.168
205.173.1.243 187.125.96.68 243.107.252.170 73.237.36.173