Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Singapore

Region: unknown

Country: Singapore

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#


NetRange:       159.48.160.0 - 159.48.191.255
CIDR:           159.48.160.0/19
NetName:        FTC-58
NetHandle:      NET-159-48-160-0-1
Parent:         NET159 (NET-159-0-0-0-0)
NetType:        Direct Allocation
OriginAS:       
Organization:   Fortinet Inc. (FTC-58)
RegDate:        2025-07-01
Updated:        2025-08-01
Comment:        Geofeed https://fortisase.com/geoipfiles/prod/geoip.csv
Ref:            https://rdap.arin.net/registry/ip/159.48.160.0


OrgName:        Fortinet Inc.
OrgId:          FTC-58
Address:        899 Kifer Road
City:           Sunnyvale
StateProv:      CA
PostalCode:     94086
Country:        US
RegDate:        2008-04-10
Updated:        2026-01-26
Ref:            https://rdap.arin.net/registry/entity/FTC-58


OrgAbuseHandle: MISAR1-ARIN
OrgAbuseName:   MIS21-ARIN-Abuse
OrgAbusePhone:  +1-604-430-1297 
OrgAbuseEmail:  abuse@fortinet.com
OrgAbuseRef:    https://rdap.arin.net/registry/entity/MISAR1-ARIN

OrgNOCHandle: MISAR2-ARIN
OrgNOCName:   MIS21-ARIN-NOC
OrgNOCPhone:  +1-604-430-1297 
OrgNOCEmail:  noc@fortinet.com
OrgNOCRef:    https://rdap.arin.net/registry/entity/MISAR2-ARIN

OrgRoutingHandle: MISAR2-ARIN
OrgRoutingName:   MIS21-ARIN-NOC
OrgRoutingPhone:  +1-604-430-1297 
OrgRoutingEmail:  noc@fortinet.com
OrgRoutingRef:    https://rdap.arin.net/registry/entity/MISAR2-ARIN

OrgTechHandle: MIS21-ARIN
OrgTechName:   Management Information System
OrgTechPhone:  +1-604-430-1297 
OrgTechEmail:  mis@fortinet.com
OrgTechRef:    https://rdap.arin.net/registry/entity/MIS21-ARIN

OrgTechHandle: TECH1581-ARIN
OrgTechName:   Tech
OrgTechPhone:  +1-604-430-1297 
OrgTechEmail:  jamesgu@fortinet.com
OrgTechRef:    https://rdap.arin.net/registry/entity/TECH1581-ARIN

OrgDNSHandle: MISAR2-ARIN
OrgDNSName:   MIS21-ARIN-NOC
OrgDNSPhone:  +1-604-430-1297 
OrgDNSEmail:  noc@fortinet.com
OrgDNSRef:    https://rdap.arin.net/registry/entity/MISAR2-ARIN


#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 159.48.163.38
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 19482
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;159.48.163.38.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2026042200 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Apr 22 18:58:52 CST 2026
;; MSG SIZE  rcvd: 106
Host info
b'Host 38.163.48.159.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 159.48.163.38.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
89.46.7.194 attackspam
Automatic report - XMLRPC Attack
2020-07-07 20:51:36
51.68.122.147 attackspam
2020-07-07T06:58:12.721191server.mjenks.net sshd[517187]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.122.147
2020-07-07T06:58:12.715101server.mjenks.net sshd[517187]: Invalid user radio from 51.68.122.147 port 56158
2020-07-07T06:58:14.934563server.mjenks.net sshd[517187]: Failed password for invalid user radio from 51.68.122.147 port 56158 ssh2
2020-07-07T07:02:13.085743server.mjenks.net sshd[517689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.68.122.147  user=root
2020-07-07T07:02:15.385745server.mjenks.net sshd[517689]: Failed password for root from 51.68.122.147 port 50686 ssh2
...
2020-07-07 21:18:40
78.188.167.108 attack
Unauthorized connection attempt detected from IP address 78.188.167.108 to port 23
2020-07-07 21:12:25
103.113.0.23 attackspam
Unauthorized connection attempt from IP address 103.113.0.23 on Port 445(SMB)
2020-07-07 20:59:38
118.200.188.53 attackbotsspam
Automatic report - Banned IP Access
2020-07-07 20:41:36
177.124.171.119 attack
Port probing on unauthorized port 23
2020-07-07 21:19:52
176.122.158.234 attackspam
Jul  7 12:47:45 rush sshd[15106]: Failed password for root from 176.122.158.234 port 58088 ssh2
Jul  7 12:56:56 rush sshd[15510]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.122.158.234
Jul  7 12:56:58 rush sshd[15510]: Failed password for invalid user render from 176.122.158.234 port 38984 ssh2
...
2020-07-07 21:16:09
46.61.91.239 attackspambots
Unauthorized connection attempt from IP address 46.61.91.239 on Port 445(SMB)
2020-07-07 21:10:46
103.40.48.219 attack
20 attempts against mh-ssh on pluto
2020-07-07 21:04:12
104.248.41.95 attackbotsspam
SCAN: Host Sweep CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-07-07 20:54:14
152.136.206.208 attackspam
152.136.206.208 - - [07/Jul/2020:14:23:18 +0200] "POST /xmlrpc.php HTTP/1.1" 403 18172 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
152.136.206.208 - - [07/Jul/2020:14:38:13 +0200] "POST /xmlrpc.php HTTP/1.1" 403 611 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-07 21:05:53
94.102.51.16 attackbots
Port scan on 3 port(s): 44414 44458 44513
2020-07-07 21:10:27
36.73.197.68 attack
Unauthorized connection attempt from IP address 36.73.197.68 on Port 445(SMB)
2020-07-07 20:56:34
45.55.57.6 attackspambots
Jul  7 12:35:13 rush sshd[14604]: Failed password for root from 45.55.57.6 port 57320 ssh2
Jul  7 12:42:07 rush sshd[14874]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.55.57.6
Jul  7 12:42:10 rush sshd[14874]: Failed password for invalid user emerson from 45.55.57.6 port 55178 ssh2
...
2020-07-07 21:09:32
118.24.121.240 attackspam
Jul  7 14:37:38 lnxmail61 sshd[31080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.121.240
Jul  7 14:37:38 lnxmail61 sshd[31080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.24.121.240
2020-07-07 20:59:10

Recently Reported IPs

45.182.140.135 110.78.156.84 2606:4700:10::ac43:1015 2606:4700:10::6814:6159
2606:4700:10::6816:3967 2606:4700:10::6814:6385 2606:4700:10::6816:1748 2606:4700:10::6816:2267
2606:4700:10::ac43:706 52.84.50.0 202.160.86.191 4.232.188.102
221.238.131.250 34.96.52.79 185.241.32.124 2606:4700:10::ac43:1957
2606:4700:10::6814:8076 2606:4700:10::6814:4991 110.78.154.190 2606:4700:10::6816:3338