Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.120.189.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61218
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.120.189.48.			IN	A

;; AUTHORITY SECTION:
.			167	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 23:03:41 CST 2022
;; MSG SIZE  rcvd: 107
Host info
b';; connection timed out; no servers could be reached
'
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.189.120.199.in-addr.arpa	name = www.gatx.eu.
48.189.120.199.in-addr.arpa	name = www.cgtx.com.
48.189.120.199.in-addr.arpa	name = www.gatxrail.ca.
48.189.120.199.in-addr.arpa	name = test2.gatx.com.
48.189.120.199.in-addr.arpa	name = www.gatxmarine.com.
48.189.120.199.in-addr.arpa	name = www.gatxraileurope.com.
48.189.120.199.in-addr.arpa	name = gatx.eu.
48.189.120.199.in-addr.arpa	name = www.railcarservices.com.
48.189.120.199.in-addr.arpa	name = gatxcapital.com.
48.189.120.199.in-addr.arpa	name = www.railcarmaintenance.com.
48.189.120.199.in-addr.arpa	name = www.tanktrain.com.
48.189.120.199.in-addr.arpa	name = www.gatxrailmexico.com.
48.189.120.199.in-addr.arpa	name = www.gatxventures.com.
48.189.120.199.in-addr.arpa	name = www.gatxmexico.com.
48.189.120.199.in-addr.arpa	name = jobs.gatx.com.
48.189.120.199.in-addr.arpa	name = www.gatxair.com.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
118.175.134.56 attackbotsspam
Hits on port : 9001
2019-11-29 20:58:49
182.61.26.165 attack
Nov 29 11:34:11 fr01 sshd[20857]: Invalid user cmwong from 182.61.26.165
Nov 29 11:34:11 fr01 sshd[20857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.26.165
Nov 29 11:34:11 fr01 sshd[20857]: Invalid user cmwong from 182.61.26.165
Nov 29 11:34:13 fr01 sshd[20857]: Failed password for invalid user cmwong from 182.61.26.165 port 56478 ssh2
...
2019-11-29 21:14:31
49.206.29.141 attack
23/tcp
[2019-11-29]1pkt
2019-11-29 21:06:53
79.137.72.98 attackspam
2019-11-29T09:40:02.341502ns386461 sshd\[8320\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.ip-79-137-72.eu  user=root
2019-11-29T09:40:04.375364ns386461 sshd\[8320\]: Failed password for root from 79.137.72.98 port 50049 ssh2
2019-11-29T09:49:16.161583ns386461 sshd\[16302\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.ip-79-137-72.eu  user=root
2019-11-29T09:49:18.250164ns386461 sshd\[16302\]: Failed password for root from 79.137.72.98 port 58968 ssh2
2019-11-29T09:52:08.629572ns386461 sshd\[18691\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=98.ip-79-137-72.eu  user=root
...
2019-11-29 21:15:28
36.75.140.147 attackbots
Unauthorised access (Nov 29) SRC=36.75.140.147 LEN=52 TTL=248 ID=12179 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-29 21:03:39
103.45.251.60 attack
11/29/2019-01:18:49.126190 103.45.251.60 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-29 21:10:23
209.15.37.34 attackbotsspam
Wordpress login scanning
2019-11-29 20:40:55
49.234.203.5 attack
Invalid user bordoni from 49.234.203.5 port 50234
2019-11-29 21:11:38
217.182.15.161 attackbotsspam
Nov 29 07:18:52 icecube postfix/smtpd[64930]: NOQUEUE: reject: RCPT from tradition.linkingfirst.com[217.182.15.161]: 554 5.7.1 Service unavailable; Client host [217.182.15.161] blocked using zen.spamhaus.org; https://www.spamhaus.org/sbl/query/SBLCSS / https://www.spamhaus.org/query/ip/217.182.15.161; from= to= proto=ESMTP helo=
2019-11-29 21:08:34
24.32.43.215 attackbotsspam
Chat Spam
2019-11-29 20:46:07
163.172.157.162 attackbots
Nov 29 02:50:14 eddieflores sshd\[8915\]: Invalid user warm from 163.172.157.162
Nov 29 02:50:14 eddieflores sshd\[8915\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.157.162
Nov 29 02:50:16 eddieflores sshd\[8915\]: Failed password for invalid user warm from 163.172.157.162 port 42204 ssh2
Nov 29 02:53:25 eddieflores sshd\[9134\]: Invalid user Pa55w0rd123 from 163.172.157.162
Nov 29 02:53:25 eddieflores sshd\[9134\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.172.157.162
2019-11-29 21:06:29
114.32.230.117 attackbotsspam
Fail2Ban Ban Triggered
2019-11-29 20:44:35
131.72.236.113 attack
C1,WP GET /suche/wp-login.php
2019-11-29 21:09:46
150.109.106.224 attackspambots
Fail2Ban Ban Triggered
2019-11-29 20:38:15
27.154.225.186 attackspam
$f2bV_matches
2019-11-29 20:55:59

Recently Reported IPs

199.120.152.191 199.120.209.48 199.127.207.180 199.120.21.79
199.127.207.182 199.124.28.2 199.127.108.157 199.122.7.130
199.126.66.94 142.206.221.88 199.127.56.106 199.136.16.101
199.127.60.77 199.15.177.153 199.127.92.181 199.15.163.135
199.134.75.32 199.127.92.221 199.15.163.138 199.15.174.37