Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 16.225.48.114
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;16.225.48.114.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 09:21:23 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 114.48.225.16.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 16.225.48.114.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
128.199.202.206 attack
Jul 19 09:40:41 debian sshd\[2866\]: Invalid user elsa from 128.199.202.206 port 50596
Jul 19 09:40:41 debian sshd\[2866\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.202.206
...
2019-07-19 16:52:21
92.119.160.125 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-07-19 16:53:34
185.66.115.98 attackspambots
Jul 19 09:53:10 OPSO sshd\[8231\]: Invalid user mara from 185.66.115.98 port 60412
Jul 19 09:53:10 OPSO sshd\[8231\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.66.115.98
Jul 19 09:53:12 OPSO sshd\[8231\]: Failed password for invalid user mara from 185.66.115.98 port 60412 ssh2
Jul 19 09:59:51 OPSO sshd\[8699\]: Invalid user ur from 185.66.115.98 port 59954
Jul 19 09:59:51 OPSO sshd\[8699\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.66.115.98
2019-07-19 16:09:11
180.183.247.206 attackbots
Automatic report - Banned IP Access
2019-07-19 16:09:44
159.89.197.135 attackbotsspam
2019-07-19T08:07:32.727957abusebot-8.cloudsearch.cf sshd\[20590\]: Invalid user test from 159.89.197.135 port 51450
2019-07-19 16:12:56
220.134.144.96 attack
Jul 19 09:50:04 meumeu sshd[25854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.144.96 
Jul 19 09:50:06 meumeu sshd[25854]: Failed password for invalid user alumni from 220.134.144.96 port 59222 ssh2
Jul 19 09:55:40 meumeu sshd[27058]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.134.144.96 
...
2019-07-19 16:04:41
171.229.254.135 attack
TCP port 23 (Telnet) attempt blocked by firewall. [2019-07-19 07:57:48]
2019-07-19 16:11:20
50.67.178.164 attackbotsspam
Jul 19 10:26:16 legacy sshd[29779]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.67.178.164
Jul 19 10:26:18 legacy sshd[29779]: Failed password for invalid user ftp_user from 50.67.178.164 port 36386 ssh2
Jul 19 10:33:41 legacy sshd[30044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=50.67.178.164
...
2019-07-19 16:41:02
187.33.235.50 attack
Trying to (more than 3 packets) bruteforce (not open) Samba/Microsoft-DS port 445
2019-07-19 16:49:16
61.19.72.46 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-19 04:34:26,880 INFO [amun_request_handler] PortScan Detected on Port: 445 (61.19.72.46)
2019-07-19 16:54:09
168.232.130.117 attackspambots
[AUTOMATIC REPORT] - 65 tries in total - SSH BRUTE FORCE - IP banned
2019-07-19 16:35:12
45.77.155.12 attackspambots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-19 06:36:11,340 INFO [amun_request_handler] PortScan Detected on Port: 445 (45.77.155.12)
2019-07-19 16:51:45
40.112.65.88 attackspambots
Jul 19 10:19:51 legacy sshd[29568]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.112.65.88
Jul 19 10:19:53 legacy sshd[29568]: Failed password for invalid user sicher from 40.112.65.88 port 54204 ssh2
Jul 19 10:25:15 legacy sshd[29718]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.112.65.88
...
2019-07-19 16:27:59
202.154.186.73 attackspam
Automatic report - Banned IP Access
2019-07-19 16:38:19
185.86.13.213 attackspambots
Automatic report - Banned IP Access
2019-07-19 15:59:44

Recently Reported IPs

40.164.117.201 52.114.86.145 187.4.199.164 142.36.209.90
181.52.45.201 88.169.15.158 132.22.204.211 250.181.157.164
26.245.167.42 84.220.141.224 201.26.129.181 104.119.220.87
22.97.49.215 234.2.20.83 208.169.233.97 187.229.93.156
144.13.16.159 249.85.117.145 214.152.38.81 230.11.226.185