Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 149.29.48.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 44007
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;149.29.48.248.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 08:11:22 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 248.48.29.149.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.48.29.149.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.93.3.114 attackspambots
(From raphaeVapVasysoand@gmail.com) Good day!  griffithchiropractic.com 
 
We advance 
 
Sending your commercial offer through the feedback form which can be found on the sites in the Communication partition. Contact form are filled in by our program and the captcha is solved. The superiority of this method is that messages sent through feedback forms are whitelisted. This technique improve the probability that your message will be read. 
 
Our database contains more than 25 million sites around the world to which we can send your message. 
 
The cost of one million messages 49 USD 
 
FREE TEST mailing of 50,000 messages to any country of your choice. 
 
 
This message is automatically generated to use our contacts for communication. 
 
 
 
Contact us. 
Telegram - @FeedbackFormEU 
Skype  FeedbackForm2019 
WhatsApp - +44 7598 509161 
Email - FeedbackForm@make-success.com
2019-07-01 05:32:32
115.186.148.38 attack
Reported by AbuseIPDB proxy server.
2019-07-01 05:23:08
178.78.105.251 attackspam
Jun 30 20:37:35 jupiter sshd\[9458\]: Invalid user apache from 178.78.105.251
Jun 30 20:37:35 jupiter sshd\[9458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.78.105.251
Jun 30 20:37:38 jupiter sshd\[9458\]: Failed password for invalid user apache from 178.78.105.251 port 49058 ssh2
...
2019-07-01 05:08:13
201.49.127.212 attackbotsspam
Jun 30 22:49:43 MK-Soft-Root1 sshd\[9121\]: Invalid user vinay from 201.49.127.212 port 57394
Jun 30 22:49:43 MK-Soft-Root1 sshd\[9121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=201.49.127.212
Jun 30 22:49:45 MK-Soft-Root1 sshd\[9121\]: Failed password for invalid user vinay from 201.49.127.212 port 57394 ssh2
...
2019-07-01 05:15:33
38.92.124.245 attackspambots
Brute force attempt
2019-07-01 05:18:31
50.233.42.98 attackspam
proto=tcp  .  spt=49849  .  dpt=25  .     (listed on     Github Combined on 3 lists )     (750)
2019-07-01 05:09:47
185.182.56.85 attack
SQL Injection Exploit Attempts
2019-07-01 05:42:53
152.168.224.232 attack
$f2bV_matches
2019-07-01 05:08:33
122.224.36.28 attackspambots
failed_logins
2019-07-01 05:11:37
107.170.198.245 attack
30.06.2019 20:49:13 Connection to port 953 blocked by firewall
2019-07-01 05:02:48
176.117.64.41 attack
proto=tcp  .  spt=47257  .  dpt=25  .     (listed on Dark List de Jun 30)     (754)
2019-07-01 05:02:34
187.63.211.76 attackspambots
$f2bV_matches
2019-07-01 05:16:35
142.93.17.93 attackspam
2019-06-30T23:06:29.9622211240 sshd\[23233\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.17.93  user=root
2019-06-30T23:06:32.0938361240 sshd\[23233\]: Failed password for root from 142.93.17.93 port 33852 ssh2
2019-06-30T23:08:04.5345341240 sshd\[23344\]: Invalid user openvpn_as from 142.93.17.93 port 51282
2019-06-30T23:08:04.5409181240 sshd\[23344\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.17.93
...
2019-07-01 05:44:04
212.81.23.241 attack
2019-06-30T20:59:39.9628531240 sshd\[16957\]: Invalid user tb from 212.81.23.241 port 44989
2019-06-30T20:59:39.9683121240 sshd\[16957\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.81.23.241
2019-06-30T20:59:42.0454631240 sshd\[16957\]: Failed password for invalid user tb from 212.81.23.241 port 44989 ssh2
...
2019-07-01 05:42:18
182.18.208.27 attackbotsspam
Jun 30 22:27:12 herz-der-gamer sshd[25685]: Invalid user vcloud from 182.18.208.27 port 47516
Jun 30 22:27:12 herz-der-gamer sshd[25685]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.18.208.27
Jun 30 22:27:12 herz-der-gamer sshd[25685]: Invalid user vcloud from 182.18.208.27 port 47516
Jun 30 22:27:14 herz-der-gamer sshd[25685]: Failed password for invalid user vcloud from 182.18.208.27 port 47516 ssh2
...
2019-07-01 05:40:35

Recently Reported IPs

23.60.96.43 45.89.189.0 174.193.29.30 95.151.61.188
99.248.51.113 161.243.45.137 79.98.22.32 198.185.200.119
48.124.130.53 156.180.120.221 227.103.158.34 143.98.139.67
225.156.207.11 90.70.26.230 75.155.226.65 101.147.130.159
94.234.21.39 221.128.31.155 252.179.69.225 68.125.93.101