Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 148.63.83.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27950
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;148.63.83.49.			IN	A

;; AUTHORITY SECTION:
.			513	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022011002 1800 900 604800 86400

;; Query time: 68 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 11 16:48:02 CST 2022
;; MSG SIZE  rcvd: 105
Host info
49.83.63.148.in-addr.arpa domain name pointer 49.83.63.148.rev.vodafone.pt.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
49.83.63.148.in-addr.arpa	name = 49.83.63.148.rev.vodafone.pt.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
177.69.118.197 attackspam
Invalid user icaro from 177.69.118.197 port 58195
2019-10-30 14:44:15
128.199.159.194 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-30 14:50:23
188.75.16.164 attackspam
1433/tcp 445/tcp...
[2019-10-17/30]4pkt,2pt.(tcp)
2019-10-30 14:56:55
165.227.18.169 attackbots
$f2bV_matches
2019-10-30 14:57:25
54.36.100.174 attackspam
Automatic report - Banned IP Access
2019-10-30 14:58:18
161.117.195.97 attackspambots
Oct 29 20:14:30 auw2 sshd\[12488\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.117.195.97  user=root
Oct 29 20:14:32 auw2 sshd\[12488\]: Failed password for root from 161.117.195.97 port 54730 ssh2
Oct 29 20:18:55 auw2 sshd\[12839\]: Invalid user payme from 161.117.195.97
Oct 29 20:18:55 auw2 sshd\[12839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=161.117.195.97
Oct 29 20:18:57 auw2 sshd\[12839\]: Failed password for invalid user payme from 161.117.195.97 port 41002 ssh2
2019-10-30 14:31:57
162.252.57.36 attackspambots
Oct 30 07:13:49 lnxded63 sshd[25297]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=162.252.57.36
Oct 30 07:13:52 lnxded63 sshd[25297]: Failed password for invalid user squid from 162.252.57.36 port 45416 ssh2
Oct 30 07:18:17 lnxded63 sshd[25617]: Failed password for root from 162.252.57.36 port 35534 ssh2
2019-10-30 14:47:50
82.102.18.226 attack
Automatic report - Banned IP Access
2019-10-30 15:01:17
51.91.101.222 attack
Oct 30 07:32:16 legacy sshd[26319]: Failed password for root from 51.91.101.222 port 42896 ssh2
Oct 30 07:36:08 legacy sshd[26432]: Failed password for root from 51.91.101.222 port 53468 ssh2
...
2019-10-30 14:53:34
110.50.85.162 attack
email spam
2019-10-30 15:04:24
14.232.52.197 attackbotsspam
Unauthorised access (Oct 30) SRC=14.232.52.197 LEN=52 TTL=116 ID=23495 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-30 15:04:04
145.131.32.100 attack
1433/tcp 445/tcp...
[2019-09-01/10-30]15pkt,2pt.(tcp)
2019-10-30 15:06:00
58.210.180.190 attack
22/tcp 22/tcp 22/tcp
[2019-10-21/30]3pkt
2019-10-30 14:36:24
87.241.138.194 attack
8080/tcp 8080/tcp
[2019-10-18/30]2pkt
2019-10-30 14:42:34
86.47.106.151 attack
RDP Bruteforce
2019-10-30 14:54:36

Recently Reported IPs

222.71.190.78 129.0.209.111 178.112.216.84 9.142.233.10
124.76.172.213 82.105.2.115 236.136.249.141 160.146.245.96
235.174.93.78 130.253.67.46 36.173.68.81 186.250.115.50
92.35.220.96 221.36.230.206 73.159.131.69 201.250.97.77
142.192.86.187 50.130.188.244 48.95.85.176 85.212.197.248