Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: San Luis

Region: San Luis

Country: Argentina

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 190.114.68.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29521
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;190.114.68.48.			IN	A

;; AUTHORITY SECTION:
.			510	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024052701 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue May 28 08:05:18 CST 2024
;; MSG SIZE  rcvd: 106
Host info
48.68.114.190.in-addr.arpa domain name pointer 190-114-68-48.sanluisctv.com.ar.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.68.114.190.in-addr.arpa	name = 190-114-68-48.sanluisctv.com.ar.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
157.230.39.100 attackspambots
Automatic report - Banned IP Access
2020-09-02 03:13:12
212.83.163.170 attack
[2020-09-01 14:36:27] NOTICE[1185] chan_sip.c: Registration from '"454"' failed for '212.83.163.170:9135' - Wrong password
[2020-09-01 14:36:27] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-01T14:36:27.720-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="454",SessionID="0x7f10c4b99db8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.163.170/9135",Challenge="2fb05e49",ReceivedChallenge="2fb05e49",ReceivedHash="01f28ea7691e46b03845b4d39a6864e8"
[2020-09-01 14:37:50] NOTICE[1185] chan_sip.c: Registration from '"455"' failed for '212.83.163.170:9221' - Wrong password
[2020-09-01 14:37:50] SECURITY[1203] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-09-01T14:37:50.761-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="455",SessionID="0x7f10c4b99db8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/212.83.
...
2020-09-02 02:56:48
185.253.217.89 attackspambots
contact form abuse 10x
2020-09-02 03:21:03
200.71.73.129 attack
Unauthorized IMAP connection attempt
2020-09-02 02:44:12
186.4.225.23 attackbotsspam
Sep  1 13:28:18 shivevps sshd[28100]: Did not receive identification string from 186.4.225.23 port 19299
...
2020-09-02 03:17:19
107.172.140.119 attackspambots
 TCP (SYN) 107.172.140.119:33551 -> port 22, len 48
2020-09-02 02:59:27
171.12.115.90 attack
Sep  1 13:28:18 shivevps sshd[28436]: Did not receive identification string from 171.12.115.90 port 47908
...
2020-09-02 03:15:42
168.232.20.155 attack
Sep  1 13:28:18 shivevps sshd[28356]: Did not receive identification string from 168.232.20.155 port 59714
...
2020-09-02 03:18:01
207.237.148.14 attack
Unauthorized IMAP connection attempt
2020-09-02 02:42:50
175.165.228.171 attackspambots
Sep  1 13:28:19 shivevps sshd[28452]: Did not receive identification string from 175.165.228.171 port 54768
...
2020-09-02 03:14:45
149.7.217.19 attackbotsspam
Sep  1 14:28:38 sxvn sshd[92276]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.7.217.19
2020-09-02 03:04:46
183.166.162.108 attackspambots
Sep  1 13:29:05 shivevps sshd[28852]: Did not receive identification string from 183.166.162.108 port 55938
...
2020-09-02 02:52:29
200.133.39.84 attackspam
2020-09-01T14:58:06.557368shield sshd\[18871\]: Invalid user lyg from 200.133.39.84 port 48468
2020-09-01T14:58:06.567277shield sshd\[18871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-133-39-84.compute.rnp.br
2020-09-01T14:58:09.004354shield sshd\[18871\]: Failed password for invalid user lyg from 200.133.39.84 port 48468 ssh2
2020-09-01T15:02:37.273995shield sshd\[18961\]: Invalid user chloe from 200.133.39.84 port 53624
2020-09-01T15:02:37.283355shield sshd\[18961\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200-133-39-84.compute.rnp.br
2020-09-02 02:58:01
110.80.17.26 attack
Sep  1 21:08:02 lnxded63 sshd[25945]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.80.17.26
Sep  1 21:08:04 lnxded63 sshd[25945]: Failed password for invalid user joao from 110.80.17.26 port 37268 ssh2
Sep  1 21:10:37 lnxded63 sshd[26299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.80.17.26
2020-09-02 03:19:31
176.9.111.138 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-02 02:44:53

Recently Reported IPs

179.128.204.206 80.2.44.12 138.36.93.26 148.138.121.229
62.159.36.20 154.16.150.27 185.88.102.40 185.89.101.88
212.18.127.161 82.233.34.208 213.108.2.55 66.120.251.154
225.177.83.38 24.119.163.200 192.34.82.254 138.186.131.38
123.208.60.21 159.143.113.204 93.177.116.161 50.219.25.50