Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 154.63.99.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 51469
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;154.63.99.48.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022802 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 10:51:53 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 48.99.63.154.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.99.63.154.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.229.156.243 attackspam
Invalid user user1 from 111.229.156.243 port 47222
2020-10-01 18:32:53
177.130.228.131 attackspam
$f2bV_matches
2020-10-01 18:50:21
197.248.206.126 attackspam
IP 197.248.206.126 attacked honeypot on port: 23 at 9/30/2020 1:33:38 PM
2020-10-01 19:11:12
61.83.210.246 attackbots
2020-10-01T12:00:20.088549n23.at sshd[39394]: Invalid user testftp from 61.83.210.246 port 56778
2020-10-01T12:00:22.291195n23.at sshd[39394]: Failed password for invalid user testftp from 61.83.210.246 port 56778 ssh2
2020-10-01T12:06:02.228051n23.at sshd[43422]: Invalid user honda from 61.83.210.246 port 35974
...
2020-10-01 18:46:48
128.199.106.230 attackspam
128.199.106.230 - - [01/Oct/2020:08:57:17 +0200] "POST /xmlrpc.php HTTP/1.1" 403 9753 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
128.199.106.230 - - [01/Oct/2020:09:20:40 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-01 18:33:36
49.207.4.16 attackbotsspam
Automatic report - Port Scan Attack
2020-10-01 18:47:36
188.166.211.194 attack
Invalid user kibana from 188.166.211.194 port 60422
2020-10-01 18:42:46
106.13.92.126 attackbotsspam
2020-10-01T07:45:15.247232devel sshd[32376]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.92.126
2020-10-01T07:45:15.244408devel sshd[32376]: Invalid user sarah from 106.13.92.126 port 54118
2020-10-01T07:45:17.084802devel sshd[32376]: Failed password for invalid user sarah from 106.13.92.126 port 54118 ssh2
2020-10-01 18:49:38
139.219.11.254 attackspam
$f2bV_matches
2020-10-01 19:04:50
106.12.148.74 attackbotsspam
Oct  1 12:34:31 roki-contabo sshd\[3687\]: Invalid user sun from 106.12.148.74
Oct  1 12:34:31 roki-contabo sshd\[3687\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.148.74
Oct  1 12:34:33 roki-contabo sshd\[3687\]: Failed password for invalid user sun from 106.12.148.74 port 33524 ssh2
Oct  1 12:39:52 roki-contabo sshd\[3762\]: Invalid user zope from 106.12.148.74
Oct  1 12:39:52 roki-contabo sshd\[3762\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.148.74
...
2020-10-01 18:54:05
103.45.183.136 attackspambots
(sshd) Failed SSH login from 103.45.183.136 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  1 09:13:38 server2 sshd[4248]: Invalid user debian from 103.45.183.136 port 52388
Oct  1 09:13:40 server2 sshd[4248]: Failed password for invalid user debian from 103.45.183.136 port 52388 ssh2
Oct  1 09:32:29 server2 sshd[7236]: Invalid user postgres from 103.45.183.136 port 60694
Oct  1 09:32:31 server2 sshd[7236]: Failed password for invalid user postgres from 103.45.183.136 port 60694 ssh2
Oct  1 09:38:54 server2 sshd[8216]: Invalid user server from 103.45.183.136 port 58276
2020-10-01 18:51:47
106.13.47.10 attack
2020-10-01T12:39:07.938360lavrinenko.info sshd[29553]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.47.10
2020-10-01T12:39:07.928428lavrinenko.info sshd[29553]: Invalid user joyce from 106.13.47.10 port 59596
2020-10-01T12:39:10.036203lavrinenko.info sshd[29553]: Failed password for invalid user joyce from 106.13.47.10 port 59596 ssh2
2020-10-01T12:43:09.381100lavrinenko.info sshd[29794]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.47.10  user=root
2020-10-01T12:43:11.704859lavrinenko.info sshd[29794]: Failed password for root from 106.13.47.10 port 54278 ssh2
...
2020-10-01 18:51:22
97.74.232.157 attackbots
15 attempts against mh-modsecurity-ban on sonic
2020-10-01 18:53:25
5.160.215.42 attackspambots
DATE:2020-09-30 22:34:40, IP:5.160.215.42, PORT:telnet Telnet brute force auth on honeypot server (honey-neo-dc)
2020-10-01 18:50:01
177.0.108.210 attackbots
Invalid user ss from 177.0.108.210 port 59058
2020-10-01 18:58:00

Recently Reported IPs

97.220.221.143 109.217.199.102 59.26.45.52 163.132.91.131
141.194.103.107 64.190.89.201 40.105.210.25 131.147.51.166
232.196.25.160 191.163.192.163 114.153.99.222 213.36.174.250
72.4.119.173 123.13.69.202 50.114.246.188 148.10.168.252
156.194.99.152 169.38.147.162 214.136.70.199 209.168.163.136