Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.251.30.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23177
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.251.30.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021200 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 12 20:40:31 CST 2025
;; MSG SIZE  rcvd: 106
Host info
48.30.251.148.in-addr.arpa domain name pointer static.48.30.251.148.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.30.251.148.in-addr.arpa	name = static.48.30.251.148.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.13.237.235 attack
Multiple SSH authentication failures from 106.13.237.235
2020-07-01 19:58:56
89.165.4.157 attackspam
unauthorized connection attempt
2020-07-01 19:44:40
139.59.146.28 attackspam
139.59.146.28 - - [30/Jun/2020:13:20:21 +0100] "POST /wp-login.php HTTP/1.1" 200 1996 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.146.28 - - [30/Jun/2020:13:20:23 +0100] "POST /wp-login.php HTTP/1.1" 200 1924 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
139.59.146.28 - - [30/Jun/2020:13:20:24 +0100] "POST /xmlrpc.php HTTP/1.1" 200 247 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-01 19:38:26
116.228.37.90 attackbotsspam
 TCP (SYN) 116.228.37.90:58352 -> port 17440, len 44
2020-07-01 19:31:28
45.55.173.232 attack
php WP PHPmyadamin ABUSE blocked for 12h
2020-07-01 20:01:49
218.85.119.92 attackbotsspam
Jun 30 11:46:04 propaganda sshd[14998]: Connection from 218.85.119.92 port 27264 on 10.0.0.160 port 22 rdomain ""
Jun 30 11:46:05 propaganda sshd[14998]: Connection closed by 218.85.119.92 port 27264 [preauth]
2020-07-01 20:13:41
113.254.161.18 attack
Unauthorized connection attempt from IP address 113.254.161.18 on Port 445(SMB)
2020-07-01 20:15:29
212.70.149.2 attack
abuse-sasl
2020-07-01 19:42:06
194.58.79.69 attack
...
2020-07-01 20:14:36
192.241.223.31 attackbotsspam
ZGrab Application Layer Scanner Detection
2020-07-01 19:48:45
42.200.66.164 attackspam
k+ssh-bruteforce
2020-07-01 20:18:46
119.17.7.68 attackspam
 TCP (SYN) 119.17.7.68:24245 -> port 23, len 44
2020-07-01 19:31:02
195.206.49.57 attackspam
unauthorized connection attempt
2020-07-01 20:19:33
223.113.74.54 attack
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.113.74.54
Invalid user log from 223.113.74.54 port 51762
Failed password for invalid user log from 223.113.74.54 port 51762 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.113.74.54  user=root
Failed password for root from 223.113.74.54 port 58888 ssh2
2020-07-01 19:52:31
222.252.115.83 attackbotsspam
Port scan on 1 port(s): 445
2020-07-01 20:21:58

Recently Reported IPs

232.145.29.151 204.43.223.42 44.123.235.20 95.26.203.103
70.8.238.41 167.248.154.150 203.254.36.22 33.251.222.172
83.35.75.159 202.133.103.131 30.130.37.228 50.252.213.19
13.145.211.166 218.9.214.139 237.118.248.204 205.216.210.153
127.25.82.40 159.60.72.86 142.236.95.35 63.238.186.132