Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: Ohio

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.48.99.85
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19226
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.48.99.85.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011602 1800 900 604800 86400

;; Query time: 55 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 17 12:27:35 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 85.99.48.158.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 158.48.99.85.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
188.3.74.117 attackbots
" "
2020-06-16 23:58:47
87.138.221.130 attackbotsspam
2020-06-16T15:25:57.676787homeassistant sshd[5784]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=87.138.221.130  user=root
2020-06-16T15:26:00.269177homeassistant sshd[5784]: Failed password for root from 87.138.221.130 port 52660 ssh2
...
2020-06-16 23:58:01
200.40.45.82 attackspambots
2020-06-16T17:29:03.602005vps773228.ovh.net sshd[7239]: Failed password for root from 200.40.45.82 port 36950 ssh2
2020-06-16T17:34:39.196777vps773228.ovh.net sshd[7318]: Invalid user usuario from 200.40.45.82 port 49220
2020-06-16T17:34:39.212726vps773228.ovh.net sshd[7318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=r200-40-45-82.ae-static.anteldata.net.uy
2020-06-16T17:34:39.196777vps773228.ovh.net sshd[7318]: Invalid user usuario from 200.40.45.82 port 49220
2020-06-16T17:34:41.474769vps773228.ovh.net sshd[7318]: Failed password for invalid user usuario from 200.40.45.82 port 49220 ssh2
...
2020-06-16 23:40:54
213.184.249.95 attack
Jun 16 14:14:53 ns382633 sshd\[30529\]: Invalid user raja from 213.184.249.95 port 34106
Jun 16 14:14:53 ns382633 sshd\[30529\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.184.249.95
Jun 16 14:14:54 ns382633 sshd\[30529\]: Failed password for invalid user raja from 213.184.249.95 port 34106 ssh2
Jun 16 14:20:22 ns382633 sshd\[31771\]: Invalid user shop from 213.184.249.95 port 43198
Jun 16 14:20:22 ns382633 sshd\[31771\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=213.184.249.95
2020-06-17 00:16:16
46.38.150.204 attackbots
757 times SMTP brute-force
2020-06-16 23:53:16
122.117.65.129 attack
Port probing on unauthorized port 23
2020-06-16 23:51:06
164.100.1.6 attack
Portscan or hack attempt detected by psad/fwsnort
2020-06-17 00:16:49
49.146.32.76 attack
1592310059 - 06/16/2020 14:20:59 Host: 49.146.32.76/49.146.32.76 Port: 445 TCP Blocked
2020-06-16 23:52:01
159.89.236.71 attack
Jun 16 16:34:54 mout sshd[9773]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.236.71  user=root
Jun 16 16:34:56 mout sshd[9773]: Failed password for root from 159.89.236.71 port 42392 ssh2
2020-06-16 23:43:48
51.254.143.190 attack
Failed password for invalid user bol from 51.254.143.190 port 50011 ssh2
2020-06-16 23:57:12
45.10.24.238 attackbots
Jun 16 12:20:36 firewall sshd[22781]: Invalid user admin from 45.10.24.238
Jun 16 12:20:38 firewall sshd[22781]: Failed password for invalid user admin from 45.10.24.238 port 44344 ssh2
Jun 16 12:23:59 firewall sshd[22832]: Invalid user aj from 45.10.24.238
...
2020-06-16 23:40:25
152.136.108.226 attackspam
Jun 16 15:26:09 ns382633 sshd\[11638\]: Invalid user vaibhav from 152.136.108.226 port 51092
Jun 16 15:26:09 ns382633 sshd\[11638\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.108.226
Jun 16 15:26:12 ns382633 sshd\[11638\]: Failed password for invalid user vaibhav from 152.136.108.226 port 51092 ssh2
Jun 16 15:34:28 ns382633 sshd\[12983\]: Invalid user arkserver from 152.136.108.226 port 49224
Jun 16 15:34:28 ns382633 sshd\[12983\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=152.136.108.226
2020-06-17 00:06:41
200.89.174.209 attack
Jun 16 17:45:23 home sshd[8267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.174.209
Jun 16 17:45:25 home sshd[8267]: Failed password for invalid user ttf from 200.89.174.209 port 34642 ssh2
Jun 16 17:46:49 home sshd[8403]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.89.174.209
...
2020-06-17 00:04:12
74.82.47.53 attackbotsspam
1592310018 - 06/16/2020 19:20:18 Host: scan-12k.shadowserver.org/74.82.47.53 Port: 17 UDP Blocked
...
2020-06-17 00:26:53
124.156.102.254 attackbotsspam
2020-06-16T07:38:16.937708server.mjenks.net sshd[1100777]: Failed password for invalid user monitor from 124.156.102.254 port 60562 ssh2
2020-06-16T07:42:51.311355server.mjenks.net sshd[1101354]: Invalid user ftp01 from 124.156.102.254 port 55906
2020-06-16T07:42:51.318598server.mjenks.net sshd[1101354]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.156.102.254
2020-06-16T07:42:51.311355server.mjenks.net sshd[1101354]: Invalid user ftp01 from 124.156.102.254 port 55906
2020-06-16T07:42:53.459878server.mjenks.net sshd[1101354]: Failed password for invalid user ftp01 from 124.156.102.254 port 55906 ssh2
...
2020-06-17 00:10:45

Recently Reported IPs

9.48.60.71 55.78.126.150 191.95.159.179 212.140.26.124
255.130.203.190 31.66.66.21 169.240.153.153 160.232.98.32
203.200.0.133 206.122.45.230 54.104.70.125 196.88.38.80
216.121.124.15 243.112.198.206 7.32.54.83 156.251.52.52
188.138.194.94 22.237.79.19 78.8.247.98 123.82.181.42