Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 192.31.42.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48953
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;192.31.42.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012200 1800 900 604800 86400

;; Query time: 41 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Jan 22 20:12:27 CST 2025
;; MSG SIZE  rcvd: 105
Host info
b'Host 48.42.31.192.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
server can't find 192.31.42.48.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
49.233.87.45 attackbotsspam
Port scan detected on ports: 65529[TCP], 65529[TCP], 1433[TCP]
2020-04-28 04:00:56
45.95.168.254 attack
Unauthorized connection attempt detected from IP address 45.95.168.254 to port 5060
2020-04-28 03:44:13
111.67.195.165 attack
bruteforce detected
2020-04-28 03:44:50
138.68.236.50 attackbots
sshd
2020-04-28 03:47:07
207.154.234.102 attackspambots
Apr 27 21:50:12 lukav-desktop sshd\[928\]: Invalid user jupiter from 207.154.234.102
Apr 27 21:50:12 lukav-desktop sshd\[928\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.234.102
Apr 27 21:50:15 lukav-desktop sshd\[928\]: Failed password for invalid user jupiter from 207.154.234.102 port 57496 ssh2
Apr 27 21:53:57 lukav-desktop sshd\[1154\]: Invalid user test from 207.154.234.102
Apr 27 21:53:57 lukav-desktop sshd\[1154\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=207.154.234.102
2020-04-28 04:10:36
187.162.5.172 attackbotsspam
Automatic report - Port Scan Attack
2020-04-28 03:43:00
191.103.77.90 attackbotsspam
trying to access non-authorized port
2020-04-28 03:52:36
185.50.149.3 attackspam
2020-04-27T20:50:21.585091l03.customhost.org.uk postfix/smtps/smtpd[13667]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
2020-04-27T20:50:34.490973l03.customhost.org.uk postfix/smtps/smtpd[13667]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
2020-04-27T20:54:46.340095l03.customhost.org.uk postfix/smtps/smtpd[14119]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
2020-04-27T20:54:59.710716l03.customhost.org.uk postfix/smtps/smtpd[14127]: warning: unknown[185.50.149.3]: SASL LOGIN authentication failed: authentication failure
...
2020-04-28 04:13:28
49.235.221.172 attackbotsspam
2020-04-27T14:57:23.799807sd-86998 sshd[17239]: Invalid user vishnu from 49.235.221.172 port 38274
2020-04-27T14:57:23.807210sd-86998 sshd[17239]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.235.221.172
2020-04-27T14:57:23.799807sd-86998 sshd[17239]: Invalid user vishnu from 49.235.221.172 port 38274
2020-04-27T14:57:25.900569sd-86998 sshd[17239]: Failed password for invalid user vishnu from 49.235.221.172 port 38274 ssh2
2020-04-27T15:03:10.563842sd-86998 sshd[17918]: Invalid user terrence from 49.235.221.172 port 46190
...
2020-04-28 03:48:40
203.110.86.24 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-04-28 03:50:14
137.97.138.28 attackspambots
Fail2Ban - HTTP Auth Bruteforce Attempt
2020-04-28 03:58:26
103.40.25.203 attackspam
(sshd) Failed SSH login from 103.40.25.203 (CN/China/-): 5 in the last 3600 secs
2020-04-28 03:39:16
187.85.239.3 attackspambots
port scan and connect, tcp 23 (telnet)
2020-04-28 03:41:30
182.156.84.130 attack
(sshd) Failed SSH login from 182.156.84.130 (IN/India/static-130.84.156.182-tataidc.co.in): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr 27 19:01:22 andromeda sshd[29062]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.156.84.130  user=root
Apr 27 19:01:23 andromeda sshd[29062]: Failed password for root from 182.156.84.130 port 56962 ssh2
Apr 27 19:11:18 andromeda sshd[29537]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.156.84.130  user=root
2020-04-28 04:05:10
123.127.222.126 attackbots
port scan and connect, tcp 1433 (ms-sql-s)
2020-04-28 03:56:05

Recently Reported IPs

130.24.224.243 242.90.1.152 25.37.231.117 212.135.75.126
233.100.255.58 144.205.52.106 50.6.33.198 193.130.31.153
225.87.121.161 154.3.115.180 104.184.208.19 129.162.100.223
126.36.183.173 189.140.241.161 186.210.99.147 50.15.59.168
144.235.169.252 116.231.143.115 235.7.148.81 228.136.233.65