Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Johannesburg

Region: Gauteng

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 196.48.53.44
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62584
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;196.48.53.44.			IN	A

;; AUTHORITY SECTION:
.			521	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020100102 1800 900 604800 86400

;; Query time: 62 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 02 13:36:43 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 44.53.48.196.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 44.53.48.196.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
5.188.84.119 attackbots
fell into ViewStateTrap:nairobi
2020-09-13 07:51:10
46.101.211.196 attackbotsspam
$f2bV_matches
2020-09-13 12:20:09
118.163.34.206 attack
Telnetd brute force attack detected by fail2ban
2020-09-13 07:40:51
167.114.98.233 attackbotsspam
2020-09-12 12:35:38.118508-0500  localhost sshd[67526]: Failed password for root from 167.114.98.233 port 46218 ssh2
2020-09-13 07:39:37
203.212.236.242 attackspambots
Icarus honeypot on github
2020-09-13 07:42:32
45.129.33.16 attack
ET DROP Dshield Block Listed Source group 1 - port: 17893 proto: tcp cat: Misc Attackbytes: 60
2020-09-13 12:09:03
190.24.6.162 attackspam
$f2bV_matches
2020-09-13 07:37:33
182.75.216.74 attack
2020-09-12 12:37:04.154494-0500  localhost sshd[67643]: Failed password for root from 182.75.216.74 port 14367 ssh2
2020-09-13 07:38:58
111.72.198.194 attackbotsspam
Sep 12 20:25:20 srv01 postfix/smtpd\[16759\]: warning: unknown\[111.72.198.194\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 20:28:46 srv01 postfix/smtpd\[16759\]: warning: unknown\[111.72.198.194\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 20:28:57 srv01 postfix/smtpd\[16759\]: warning: unknown\[111.72.198.194\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 20:29:13 srv01 postfix/smtpd\[16759\]: warning: unknown\[111.72.198.194\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 12 20:29:32 srv01 postfix/smtpd\[16759\]: warning: unknown\[111.72.198.194\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-13 12:02:28
194.105.205.42 attackspambots
Sep 13 03:57:18 ns37 sshd[20881]: Failed password for root from 194.105.205.42 port 40556 ssh2
Sep 13 03:57:18 ns37 sshd[20883]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.105.205.42
Sep 13 03:57:21 ns37 sshd[20883]: Failed password for invalid user ethos from 194.105.205.42 port 40736 ssh2
2020-09-13 12:09:36
76.11.170.252 attackspambots
Time:     Sat Sep 12 16:53:52 2020 +0000
IP:       76.11.170.252 (US/United States/-)
Failures: 5 (sshd)
Interval: 3600 seconds
Blocked:  Permanent Block [LF_SSHD]

Log entries:

Sep 12 16:53:42 pv-14-ams2 sshd[27675]: Invalid user admin from 76.11.170.252 port 52233
Sep 12 16:53:44 pv-14-ams2 sshd[27675]: Failed password for invalid user admin from 76.11.170.252 port 52233 ssh2
Sep 12 16:53:46 pv-14-ams2 sshd[27913]: Invalid user admin from 76.11.170.252 port 52315
Sep 12 16:53:49 pv-14-ams2 sshd[27913]: Failed password for invalid user admin from 76.11.170.252 port 52315 ssh2
Sep 12 16:53:50 pv-14-ams2 sshd[28119]: Invalid user admin from 76.11.170.252 port 52467
2020-09-13 07:40:08
109.158.175.230 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-13 12:22:42
148.251.106.134 attackbots
20 attempts against mh-ssh on flow
2020-09-13 12:13:51
88.147.254.66 attackbots
SSH-BruteForce
2020-09-13 12:21:39
203.114.227.121 attackbots
Port scan on 1 port(s): 445
2020-09-13 07:52:35

Recently Reported IPs

144.220.247.96 176.75.170.113 94.148.56.14 93.207.252.200
211.35.164.14 194.79.15.73 202.169.63.85 242.0.165.18
106.75.231.227 76.69.154.149 103.154.234.246 197.38.216.179
196.191.79.125 5.45.132.96 59.177.39.30 192.241.235.192
140.143.30.217 67.247.232.110 37.134.241.35 80.101.2.73