Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hyderabad

Region: Telangana

Country: India

Internet Service Provider: Reliance

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.48.205.248
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20905
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.48.205.248.			IN	A

;; AUTHORITY SECTION:
.			340	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri May 13 22:03:23 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 248.205.48.157.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 248.205.48.157.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
94.102.51.28 attack
Jul 19 21:52:41 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=94.102.51.28 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=45150 PROTO=TCP SPT=43985 DPT=37085 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 19 21:57:38 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=94.102.51.28 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=16339 PROTO=TCP SPT=43985 DPT=57619 WINDOW=1024 RES=0x00 SYN URGP=0 Jul 19 22:04:57 *hidden* kernel: [UFW BLOCK] IN=eth0 OUT= MAC=00:50:56:3f:fd:58:00:08:e3:ff:fd:90:08:00 SRC=94.102.51.28 DST=79.143.186.54 LEN=40 TOS=0x00 PREC=0x00 TTL=250 ID=32927 PROTO=TCP SPT=43985 DPT=35961 WINDOW=1024 RES=0x00 SYN URGP=0
2020-07-20 04:11:12
218.92.0.246 attackspam
Jul 19 21:35:20 piServer sshd[7315]: Failed password for root from 218.92.0.246 port 46748 ssh2
Jul 19 21:35:24 piServer sshd[7315]: Failed password for root from 218.92.0.246 port 46748 ssh2
Jul 19 21:35:28 piServer sshd[7315]: Failed password for root from 218.92.0.246 port 46748 ssh2
Jul 19 21:35:33 piServer sshd[7315]: Failed password for root from 218.92.0.246 port 46748 ssh2
...
2020-07-20 03:44:50
49.233.26.148 attack
Lines containing failures of 49.233.26.148
Jul 19 20:02:36 shared12 sshd[20961]: Invalid user cgp from 49.233.26.148 port 54486
Jul 19 20:02:36 shared12 sshd[20961]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.26.148
Jul 19 20:02:38 shared12 sshd[20961]: Failed password for invalid user cgp from 49.233.26.148 port 54486 ssh2
Jul 19 20:02:39 shared12 sshd[20961]: Received disconnect from 49.233.26.148 port 54486:11: Bye Bye [preauth]
Jul 19 20:02:39 shared12 sshd[20961]: Disconnected from invalid user cgp 49.233.26.148 port 54486 [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=49.233.26.148
2020-07-20 03:49:49
147.50.135.171 attack
Jul 19 22:38:50 lukav-desktop sshd\[21840\]: Invalid user johan from 147.50.135.171
Jul 19 22:38:50 lukav-desktop sshd\[21840\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.50.135.171
Jul 19 22:38:52 lukav-desktop sshd\[21840\]: Failed password for invalid user johan from 147.50.135.171 port 51766 ssh2
Jul 19 22:42:35 lukav-desktop sshd\[22010\]: Invalid user frida from 147.50.135.171
Jul 19 22:42:35 lukav-desktop sshd\[22010\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.50.135.171
2020-07-20 03:54:47
101.227.82.60 attackspam
2020-07-19T19:29:24.143475mail.csmailer.org sshd[25887]: Invalid user www-data from 101.227.82.60 port 34874
2020-07-19T19:29:24.148057mail.csmailer.org sshd[25887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.227.82.60
2020-07-19T19:29:24.143475mail.csmailer.org sshd[25887]: Invalid user www-data from 101.227.82.60 port 34874
2020-07-19T19:29:25.791284mail.csmailer.org sshd[25887]: Failed password for invalid user www-data from 101.227.82.60 port 34874 ssh2
2020-07-19T19:32:27.190319mail.csmailer.org sshd[26134]: Invalid user dave from 101.227.82.60 port 41980
...
2020-07-20 03:39:59
185.220.100.255 attack
Mailserver and mailaccount attacks
2020-07-20 03:47:53
61.177.172.128 attack
Jul 19 20:11:49 scw-6657dc sshd[6794]: Failed password for root from 61.177.172.128 port 11253 ssh2
Jul 19 20:11:49 scw-6657dc sshd[6794]: Failed password for root from 61.177.172.128 port 11253 ssh2
Jul 19 20:11:52 scw-6657dc sshd[6794]: Failed password for root from 61.177.172.128 port 11253 ssh2
...
2020-07-20 04:15:39
82.144.215.13 attackbots
Jul   19   04:03:36   82.144.215.13   PROTO=TCP   SPT=18868 DPT=23
Jul   19   04:03:59   82.144.215.13   PROTO=TCP   SPT=18868 DPT=23
Jul   19   04:05:35   82.144.215.13   PROTO=TCP   SPT=18868 DPT=23
Jul   19   04:06:47   82.144.215.13   PROTO=TCP   SPT=18868 DPT=23
Jul   19   04:08:06   82.144.215.13   PROTO=TCP   SPT=18868 DPT=23
Jul   19   04:11:11   82.144.215.13   PROTO=TCP   SPT=18868 DPT=23
2020-07-20 03:55:59
42.113.96.111 attack
Automatic report - Port Scan Attack
2020-07-20 03:56:59
103.9.78.228 attackbotsspam
445/tcp 1433/tcp...
[2020-05-22/07-19]7pkt,2pt.(tcp)
2020-07-20 04:11:57
185.221.134.234 attackspambots
firewall-block, port(s): 8000/tcp, 8080/tcp, 8888/tcp
2020-07-20 04:16:48
106.12.52.229 attack
SSH Brute Force
2020-07-20 03:41:37
159.65.144.102 attackbotsspam
2020-07-19T19:39:27+0200 Failed SSH Authentication/Brute Force Attack. (Server 5)
2020-07-20 03:45:10
123.206.17.3 attackbotsspam
Jul 19 20:20:48 haigwepa sshd[7850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=123.206.17.3 
Jul 19 20:20:51 haigwepa sshd[7850]: Failed password for invalid user openproject from 123.206.17.3 port 60196 ssh2
...
2020-07-20 03:49:16
178.32.218.192 attackbots
Jul 19 17:24:10 main sshd[19052]: Failed password for invalid user appserv from 178.32.218.192 port 57929 ssh2
2020-07-20 04:12:58

Recently Reported IPs

220.142.204.35 175.129.35.61 27.86.32.14 166.98.194.220
186.177.104.123 187.163.172.152 188.114.96.15 229.176.75.147
27.72.30.37 172.104.182.45 133.57.103.253 10.6.81.146
241.90.35.245 180.130.180.42 218.182.81.169 164.68.127.235
164.68.127.8 123.17.62.209 45.192.155.174 67.183.255.182