Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.28.42.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22378
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.28.42.48.			IN	A

;; AUTHORITY SECTION:
.			580	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021702 1800 900 604800 86400

;; Query time: 84 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 12:49:41 CST 2022
;; MSG SIZE  rcvd: 105
Host info
48.42.28.149.in-addr.arpa domain name pointer 149.28.42.48.vultr.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.42.28.149.in-addr.arpa	name = 149.28.42.48.vultr.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.100.53.94 attackbots
fail2ban -- 157.100.53.94
...
2020-04-17 02:15:24
47.75.167.60 attackspambots
Apr 16 14:01:06 xeon postfix/smtpd[26432]: warning: unknown[47.75.167.60]: SASL PLAIN authentication failed: authentication failure
2020-04-17 02:20:50
186.67.71.253 attackspam
Apr 16 16:05:29 XXXXXX sshd[42205]: Invalid user webadmin from 186.67.71.253 port 29961
2020-04-17 01:59:14
159.89.157.75 attackbotsspam
2020-04-16T19:57:12.892071vps773228.ovh.net sshd[21817]: Failed password for invalid user lt from 159.89.157.75 port 60696 ssh2
2020-04-16T20:01:46.459859vps773228.ovh.net sshd[23507]: Invalid user hc from 159.89.157.75 port 39340
2020-04-16T20:01:46.471197vps773228.ovh.net sshd[23507]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.157.75
2020-04-16T20:01:46.459859vps773228.ovh.net sshd[23507]: Invalid user hc from 159.89.157.75 port 39340
2020-04-16T20:01:48.056366vps773228.ovh.net sshd[23507]: Failed password for invalid user hc from 159.89.157.75 port 39340 ssh2
...
2020-04-17 02:09:02
182.19.211.195 attack
firewall-block, port(s): 23/tcp
2020-04-17 02:10:13
114.222.23.45 attackbotsspam
sshd jail - ssh hack attempt
2020-04-17 02:35:13
118.163.58.117 attackbotsspam
Wordpress attack
2020-04-17 02:19:10
138.197.179.111 attack
Apr 16 17:24:10 host5 sshd[20382]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=138.197.179.111  user=root
Apr 16 17:24:12 host5 sshd[20382]: Failed password for root from 138.197.179.111 port 55772 ssh2
...
2020-04-17 02:17:08
184.105.247.228 attack
firewall-block, port(s): 5555/tcp
2020-04-17 02:08:50
129.211.146.50 attack
Apr 16 17:09:17 124388 sshd[3761]: Failed password for invalid user test from 129.211.146.50 port 48424 ssh2
Apr 16 17:14:00 124388 sshd[3840]: Invalid user ii from 129.211.146.50 port 43228
Apr 16 17:14:00 124388 sshd[3840]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.211.146.50
Apr 16 17:14:00 124388 sshd[3840]: Invalid user ii from 129.211.146.50 port 43228
Apr 16 17:14:01 124388 sshd[3840]: Failed password for invalid user ii from 129.211.146.50 port 43228 ssh2
2020-04-17 01:53:57
128.199.142.204 attack
firewall-block, port(s): 2048/tcp
2020-04-17 02:12:37
122.51.2.33 attackbotsspam
Apr 16 06:57:23 server1 sshd\[7755\]: Invalid user fg from 122.51.2.33
Apr 16 06:57:23 server1 sshd\[7755\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.2.33 
Apr 16 06:57:25 server1 sshd\[7755\]: Failed password for invalid user fg from 122.51.2.33 port 46406 ssh2
Apr 16 07:02:37 server1 sshd\[8995\]: Invalid user test from 122.51.2.33
Apr 16 07:02:37 server1 sshd\[8995\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.2.33 
...
2020-04-17 02:02:05
94.191.64.59 attackspam
Triggered by Fail2Ban at Ares web server
2020-04-17 02:31:04
188.165.231.148 attackspam
Trolling for resource vulnerabilities
2020-04-17 02:07:12
178.175.131.194 attackspam
Automatic report - Banned IP Access
2020-04-17 02:06:10

Recently Reported IPs

149.28.36.199 149.28.44.93 149.28.39.186 149.28.39.55
149.28.46.235 149.28.45.243 149.28.37.20 149.28.36.241
149.28.40.255 149.28.49.120 149.28.48.138 149.28.54.232
149.28.59.55 149.28.51.241 149.28.61.32 149.28.55.177
149.28.62.19 149.28.72.35 149.28.66.124 149.28.78.177