Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Nigeria

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
169.239.48.108 attackspam
Unauthorized connection attempt detected from IP address 169.239.48.108 to port 2220 [J]
2020-01-16 21:58:55
169.239.48.108 attackspam
Jan  7 11:35:17 zn006 sshd[12964]: Invalid user tricia from 169.239.48.108
Jan  7 11:35:17 zn006 sshd[12964]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=169.239.48.108 
Jan  7 11:35:19 zn006 sshd[12964]: Failed password for invalid user tricia from 169.239.48.108 port 56844 ssh2
Jan  7 11:35:19 zn006 sshd[12964]: Received disconnect from 169.239.48.108: 11: Bye Bye [preauth]
Jan  7 11:43:23 zn006 sshd[13715]: Invalid user hema from 169.239.48.108
Jan  7 11:43:23 zn006 sshd[13715]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=169.239.48.108 
Jan  7 11:43:25 zn006 sshd[13715]: Failed password for invalid user hema from 169.239.48.108 port 51528 ssh2
Jan  7 11:43:25 zn006 sshd[13715]: Received disconnect from 169.239.48.108: 11: Bye Bye [preauth]
Jan  7 11:46:14 zn006 sshd[14231]: Invalid user db2admin from 169.239.48.108
Jan  7 11:46:14 zn006 sshd[14231]: pam_unix(sshd:auth): authentic........
-------------------------------
2020-01-12 04:20:47
169.239.48.202 attackbots
08.01.2020 14:03:54 - SMTP Spam without Auth on hMailserver 
Detected by ELinOX-hMail-A2F
2020-01-08 23:32:59
169.239.48.162 attackspam
Jun 17 09:33:37 our-server-hostname postfix/smtpd[31797]: connect from unknown[169.239.48.162]
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun x@x
Jun 17 09:33:54 our-server-hostname postfix/smtpd[31797]: too many errors after RCPT from unknown[169.239.48.162]
Jun 17 09:33:54 our-server-hostname postfix/smtpd[31797]: disconnect from unknown[169.239.48.162]
Jun 17 09:36:33 our-server-hostname postfix/smtpd[32495]: connect from unknown[169.239.48.162]
Jun x@x
Jun x@x
Jun x@x
Jun 17 09:36:37 our-server-hostname postfix/smtpd[32495]: lost connection after RCPT from unknown[169.239.48.162]
Jun 17 09:36:37 our-server-hostname postfix/smtpd[32495]: disconnect from unknown[169.239.48.162]
Jun 17 12:31:16 our-server-hostname postfix/smtpd[9223]: connect from unknown[169.239.48.162]
Jun x@x
Jun 17 12:31:19 our-server-hostname postfix/smtpd[9223]: lost connection after RCPT ........
-------------------------------
2019-06-23 08:21:16
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 169.239.48.82
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18853
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;169.239.48.82.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 15:31:39 CST 2022
;; MSG SIZE  rcvd: 106
Host info
b';; connection timed out; no servers could be reached
'
Nslookup info:
server can't find 169.239.48.82.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
188.166.72.240 attackspambots
2019-10-03T00:29:14.394133suse-nuc sshd[28962]: Invalid user charles from 188.166.72.240 port 33906
...
2020-01-21 05:51:38
37.49.227.202 attackspam
01/20/2020-17:13:19.892103 37.49.227.202 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 33
2020-01-21 06:28:11
89.235.99.92 attackbots
Unauthorized connection attempt from IP address 89.235.99.92 on Port 445(SMB)
2020-01-21 06:27:19
188.166.172.189 attackspam
2020-01-19T01:38:02.081533suse-nuc sshd[819]: Invalid user younes from 188.166.172.189 port 41546
...
2020-01-21 06:04:24
188.166.220.17 attack
2019-09-21T21:26:00.665208suse-nuc sshd[5595]: Invalid user nfsnobody from 188.166.220.17 port 54706
...
2020-01-21 06:01:36
77.247.110.184 attack
1579555739 - 01/20/2020 22:28:59 Host: 77.247.110.184/77.247.110.184 Port: 5060 UDP Blocked
2020-01-21 06:29:16
186.210.241.112 attackbotsspam
2019-09-08T06:09:56.893834-07:00 suse-nuc sshd[23738]: Invalid user admin from 186.210.241.112 port 46455
...
2020-01-21 06:23:28
188.131.142.109 attackspam
2019-12-01T00:16:24.614037suse-nuc sshd[9524]: Invalid user test from 188.131.142.109 port 40798
...
2020-01-21 06:25:03
188.131.174.3 attackspam
2020-01-09T15:48:57.774267suse-nuc sshd[27345]: Invalid user jira from 188.131.174.3 port 47166
...
2020-01-21 06:21:50
222.186.180.223 attackspambots
Jan 20 23:16:50 silence02 sshd[8389]: Failed password for root from 222.186.180.223 port 56822 ssh2
Jan 20 23:17:02 silence02 sshd[8389]: Failed password for root from 222.186.180.223 port 56822 ssh2
Jan 20 23:17:02 silence02 sshd[8389]: error: maximum authentication attempts exceeded for root from 222.186.180.223 port 56822 ssh2 [preauth]
2020-01-21 06:20:34
222.186.173.142 attackspambots
2020-01-18 19:09:42 -> 2020-01-20 19:23:09 : 51 login attempts (222.186.173.142)
2020-01-21 06:08:20
188.166.237.191 attackbots
2019-10-08T18:17:05.200274suse-nuc sshd[5151]: Invalid user applmgr from 188.166.237.191 port 40966
...
2020-01-21 05:56:02
2607:5300:60:95e::1 attackspam
C1,DEF GET /wp-login.php
2020-01-21 06:13:30
188.131.173.220 attackspam
Unauthorized connection attempt detected from IP address 188.131.173.220 to port 2220 [J]
2020-01-21 06:22:13
188.165.251.225 attackbots
2019-10-21T21:08:22.285225suse-nuc sshd[3738]: Invalid user admin from 188.165.251.225 port 57209
...
2020-01-21 06:12:31

Recently Reported IPs

52.90.61.90 89.191.229.66 43.228.95.138 88.248.120.186
14.161.20.133 82.78.48.228 123.10.34.93 223.166.74.67
164.90.165.53 116.75.196.93 62.173.148.45 115.226.217.248
93.177.116.253 59.94.183.21 141.98.87.30 192.177.158.237
172.56.22.64 139.194.184.109 27.5.43.115 120.85.105.30