Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Alexandria

Region: Alexandria

Country: Egypt

Internet Service Provider: TE Data

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbots
Mar 27 22:17:59 debian-2gb-nbg1-2 kernel: \[7602948.941702\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=197.48.80.64 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=48 ID=38406 PROTO=TCP SPT=6091 DPT=23 WINDOW=14319 RES=0x00 SYN URGP=0
2020-03-28 06:22:16
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 197.48.80.64
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41425
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;197.48.80.64.			IN	A

;; AUTHORITY SECTION:
.			413	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032702 1800 900 604800 86400

;; Query time: 105 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 28 06:22:13 CST 2020
;; MSG SIZE  rcvd: 116
Host info
64.80.48.197.in-addr.arpa domain name pointer host-197.48.80.64.tedata.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
64.80.48.197.in-addr.arpa	name = host-197.48.80.64.tedata.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
43.226.153.200 attackspam
firewall-block, port(s): 1433/tcp
2020-07-07 23:55:47
95.56.246.2 attack
20/7/7@07:59:34: FAIL: Alarm-Network address from=95.56.246.2
20/7/7@07:59:34: FAIL: Alarm-Network address from=95.56.246.2
...
2020-07-08 00:29:03
196.37.111.217 attackspambots
(sshd) Failed SSH login from 196.37.111.217 (ZA/South Africa/-): 5 in the last 3600 secs
2020-07-08 00:05:11
221.209.17.222 attack
SSH BruteForce Attack
2020-07-08 00:31:15
45.145.64.100 attackbots
Blocked for SQL Injection in query string: term=flat-fee
2020-07-07 23:52:08
54.144.250.70 attack
54.144.250.70 - - [07/Jul/2020:13:48:16 +0200] "POST /xmlrpc.php HTTP/1.1" 403 11022 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
54.144.250.70 - - [07/Jul/2020:13:59:33 +0200] "POST /xmlrpc.php HTTP/1.1" 403 461 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-07-08 00:30:52
185.36.81.232 attackspambots
[2020-07-07 12:04:25] NOTICE[1150] chan_sip.c: Registration from '"8888" ' failed for '185.36.81.232:59949' - Wrong password
[2020-07-07 12:04:25] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-07T12:04:25.472-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="8888",SessionID="0x7fcb4c03b8a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.36.81.232/59949",Challenge="605a5d01",ReceivedChallenge="605a5d01",ReceivedHash="85064aeff181e9d0d3676bd819c08242"
[2020-07-07 12:05:22] NOTICE[1150] chan_sip.c: Registration from '"88888" ' failed for '185.36.81.232:61771' - Wrong password
[2020-07-07 12:05:22] SECURITY[1167] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2020-07-07T12:05:22.176-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="88888",SessionID="0x7fcb4c03b8a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/
...
2020-07-08 00:21:40
60.169.77.181 attackspam
1433/tcp
[2020-07-07]1pkt
2020-07-07 23:54:44
167.114.177.201 attackspam
Brute force attempt
2020-07-08 00:01:41
110.88.160.179 attackspambots
Jul  7 13:37:08 scw-6657dc sshd[3526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.88.160.179
Jul  7 13:37:08 scw-6657dc sshd[3526]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=110.88.160.179
Jul  7 13:37:10 scw-6657dc sshd[3526]: Failed password for invalid user emilia from 110.88.160.179 port 38752 ssh2
...
2020-07-08 00:22:38
185.234.219.117 attack
Automatic report - Brute Force attack using this IP address
2020-07-08 00:05:38
112.85.42.232 attackspam
Jul  7 18:28:28 home sshd[25065]: Failed password for root from 112.85.42.232 port 20015 ssh2
Jul  7 18:29:38 home sshd[25137]: Failed password for root from 112.85.42.232 port 58655 ssh2
...
2020-07-08 00:32:49
194.61.24.94 attackbots
194.61.24.94 - - [07/Jul/2020:13:11:49 +0000] "GET /adminer-4.4.0-mysql-en.php HTTP/1.1" 404 224 "-" "-"
2020-07-08 00:10:48
36.155.115.95 attack
Jul  7 13:59:47 serwer sshd\[26779\]: Invalid user wang from 36.155.115.95 port 37083
Jul  7 13:59:47 serwer sshd\[26779\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.155.115.95
Jul  7 13:59:49 serwer sshd\[26779\]: Failed password for invalid user wang from 36.155.115.95 port 37083 ssh2
...
2020-07-08 00:19:35
106.13.144.207 attackbots
SSH login attempts.
2020-07-08 00:30:32

Recently Reported IPs

75.188.38.49 71.133.107.210 190.187.79.33 152.176.70.139
131.154.98.150 117.35.38.96 197.30.71.75 64.79.74.13
187.1.13.211 100.12.228.171 156.160.216.63 221.156.122.152
134.19.182.31 163.172.8.228 115.101.222.90 62.227.184.32
3.94.225.69 129.183.18.253 204.13.118.155 40.71.203.158