Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 152.8.48.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 49922
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;152.8.48.42.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 03:23:39 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 42.48.8.152.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.48.8.152.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
54.39.150.116 attackbots
Jul 27 02:51:48 debian sshd\[23433\]: Invalid user bigboy from 54.39.150.116 port 58346
Jul 27 02:51:48 debian sshd\[23433\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.39.150.116
...
2019-07-27 11:39:39
49.83.145.74 attackbots
20 attempts against mh-ssh on float.magehost.pro
2019-07-27 11:53:32
129.204.52.150 attack
Jul 27 05:27:24 vps647732 sshd[16453]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=129.204.52.150
Jul 27 05:27:26 vps647732 sshd[16453]: Failed password for invalid user add from 129.204.52.150 port 38542 ssh2
...
2019-07-27 11:39:09
176.37.177.78 attackspam
Jul 27 04:00:58 hosting sshd[16794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=host-176-37-177-78.la.net.ua  user=root
Jul 27 04:01:00 hosting sshd[16794]: Failed password for root from 176.37.177.78 port 58846 ssh2
...
2019-07-27 11:19:52
51.68.190.223 attack
SSH/22 MH Probe, BF, Hack -
2019-07-27 11:51:34
190.75.13.232 attackbotsspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-26 21:39:14]
2019-07-27 11:47:35
181.224.250.194 attackspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 17:22:32,539 INFO [shellcode_manager] (181.224.250.194) no match, writing hexdump (1f4bd296290c2fdb9eaa88bcf9ae679e :2139596) - MS17010 (EternalBlue)
2019-07-27 11:50:56
185.207.57.50 attackspam
SPF Fail sender not permitted to send mail for @pocinc.net
2019-07-27 11:44:00
176.109.235.193 attack
" "
2019-07-27 11:06:12
51.38.224.75 attackbotsspam
Jul 27 05:48:34 SilenceServices sshd[9044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.224.75
Jul 27 05:48:36 SilenceServices sshd[9044]: Failed password for invalid user dincent from 51.38.224.75 port 59712 ssh2
Jul 27 05:53:00 SilenceServices sshd[12291]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.38.224.75
2019-07-27 11:53:15
165.227.77.120 attackbots
Unauthorized SSH login attempts
2019-07-27 11:08:35
100.2.40.223 attackspambots
firewall-block, port(s): 23/tcp
2019-07-27 11:50:22
91.121.179.17 attackbots
Invalid user connie from 91.121.179.17 port 38372
2019-07-27 11:52:19
167.99.209.200 attackbots
SSH/22 MH Probe, BF, Hack -
2019-07-27 11:20:18
170.150.179.198 attack
firewall-block, port(s): 34567/tcp
2019-07-27 11:44:23

Recently Reported IPs

65.50.246.198 51.130.155.175 152.158.187.18 47.158.68.77
252.37.223.140 114.114.95.247 72.127.23.147 98.146.232.111
117.137.230.106 204.231.226.30 179.32.188.144 60.10.89.12
133.42.56.174 32.33.90.95 175.230.136.47 116.48.84.3
47.216.169.109 20.157.39.90 208.233.52.2 85.23.203.150