Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ring

Region: Ostergotlands Lan

Country: Sweden

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.92.48.196
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 21521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;158.92.48.196.			IN	A

;; AUTHORITY SECTION:
.			544	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020010300 1800 900 604800 86400

;; Query time: 114 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 04 00:43:06 CST 2020
;; MSG SIZE  rcvd: 117
Host info
Host 196.48.92.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 196.48.92.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.83.42.108 attackbots
Unauthorized connection attempt detected from IP address 51.83.42.108 to port 2220 [J]
2020-02-02 08:19:09
177.37.176.210 attack
Unauthorized connection attempt detected from IP address 177.37.176.210 to port 4567 [J]
2020-02-02 08:59:33
183.166.128.171 attack
Feb  1 21:56:03 *** sshd[29748]: Did not receive identification string from 183.166.128.171
2020-02-02 08:29:11
222.186.173.215 attack
Feb  1 19:29:14 plusreed sshd[13801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Feb  1 19:29:16 plusreed sshd[13801]: Failed password for root from 222.186.173.215 port 7428 ssh2
Feb  1 19:29:19 plusreed sshd[13801]: Failed password for root from 222.186.173.215 port 7428 ssh2
Feb  1 19:29:14 plusreed sshd[13801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Feb  1 19:29:16 plusreed sshd[13801]: Failed password for root from 222.186.173.215 port 7428 ssh2
Feb  1 19:29:19 plusreed sshd[13801]: Failed password for root from 222.186.173.215 port 7428 ssh2
Feb  1 19:29:14 plusreed sshd[13801]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.215  user=root
Feb  1 19:29:16 plusreed sshd[13801]: Failed password for root from 222.186.173.215 port 7428 ssh2
Feb  1 19:29:19 plusreed sshd[13801]: Failed password for root from 22
2020-02-02 09:05:31
123.207.78.83 attackbotsspam
Invalid user neelakshi from 123.207.78.83 port 53534
2020-02-02 08:37:15
110.52.215.86 attackspam
Unauthorized connection attempt detected from IP address 110.52.215.86 to port 2220 [J]
2020-02-02 09:02:13
103.134.133.29 attackspam
firewall-block, port(s): 23/tcp
2020-02-02 08:31:08
5.202.150.179 attack
Unauthorized connection attempt detected from IP address 5.202.150.179 to port 8080 [J]
2020-02-02 09:08:30
104.206.128.30 attackbotsspam
Unauthorized connection attempt detected from IP address 104.206.128.30 to port 3389 [J]
2020-02-02 09:09:45
149.56.28.2 attack
Feb  1 23:15:27 h2177944 kernel: \[3793477.530410\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=149.56.28.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=13851 PROTO=TCP SPT=53293 DPT=3335 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  1 23:15:27 h2177944 kernel: \[3793477.530426\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=149.56.28.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=241 ID=13851 PROTO=TCP SPT=53293 DPT=3335 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  1 23:48:31 h2177944 kernel: \[3795461.353667\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=149.56.28.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=31156 PROTO=TCP SPT=53293 DPT=3342 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  1 23:48:31 h2177944 kernel: \[3795461.353681\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=149.56.28.2 DST=85.214.117.9 LEN=40 TOS=0x00 PREC=0x00 TTL=240 ID=31156 PROTO=TCP SPT=53293 DPT=3342 WINDOW=1024 RES=0x00 SYN URGP=0 
Feb  2 00:07:59 h2177944 kernel: \[3796628.609379\] \[UFW BLOCK\] IN=venet0 OUT= MAC= SRC=149.56.28.2 DST=85.214.117.9 LEN=40 TO
2020-02-02 08:18:16
62.210.89.189 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-02-02 08:41:40
52.58.94.204 attack
Unauthorized connection attempt detected from IP address 52.58.94.204 to port 80
2020-02-02 08:20:39
200.196.249.170 attack
Unauthorized connection attempt detected from IP address 200.196.249.170 to port 2220 [J]
2020-02-02 08:36:36
188.154.136.200 attackspambots
Chat Spam
2020-02-02 08:32:18
13.112.6.175 attack
Unauthorized connection attempt detected from IP address 13.112.6.175 to port 80 [T]
2020-02-02 09:11:28

Recently Reported IPs

83.69.181.50 116.148.252.34 83.91.139.49 36.105.25.78
130.18.166.79 180.190.183.26 183.106.241.27 141.8.188.171
41.80.167.249 6.214.254.230 185.124.117.221 113.1.40.8
60.208.116.210 87.97.209.133 188.150.119.163 31.13.191.86
179.110.227.180 14.239.44.63 163.94.180.238 162.168.171.11