Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: North Vancouver

Region: British Columbia

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.247.48.42
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22027
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;199.247.48.42.			IN	A

;; AUTHORITY SECTION:
.			483	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019120402 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 05 13:02:35 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 42.48.247.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 42.48.247.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.111.120.166 attack
Sep 20 01:53:57 hcbbdb sshd\[15537\]: Invalid user sanvirk from 183.111.120.166
Sep 20 01:53:57 hcbbdb sshd\[15537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.120.166
Sep 20 01:54:00 hcbbdb sshd\[15537\]: Failed password for invalid user sanvirk from 183.111.120.166 port 40096 ssh2
Sep 20 01:58:27 hcbbdb sshd\[16033\]: Invalid user theobold from 183.111.120.166
Sep 20 01:58:27 hcbbdb sshd\[16033\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.111.120.166
2019-09-20 09:59:11
156.222.204.93 attackspambots
Sep 20 03:07:24 dev sshd\[22695\]: Invalid user admin from 156.222.204.93 port 58043
Sep 20 03:07:24 dev sshd\[22695\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=156.222.204.93
Sep 20 03:07:26 dev sshd\[22695\]: Failed password for invalid user admin from 156.222.204.93 port 58043 ssh2
2019-09-20 09:40:46
89.248.172.85 attackspam
09/19/2019-21:07:20.241874 89.248.172.85 Protocol: 6 ET CINS Active Threat Intelligence Poor Reputation IP group 100
2019-09-20 09:54:49
51.38.48.127 attackspam
Sep 19 15:18:53 sachi sshd\[32458\]: Invalid user webadmin from 51.38.48.127
Sep 19 15:18:53 sachi sshd\[32458\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.ip-51-38-48.eu
Sep 19 15:18:55 sachi sshd\[32458\]: Failed password for invalid user webadmin from 51.38.48.127 port 40666 ssh2
Sep 19 15:22:49 sachi sshd\[371\]: Invalid user mi from 51.38.48.127
Sep 19 15:22:49 sachi sshd\[371\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=127.ip-51-38-48.eu
2019-09-20 10:03:29
104.248.32.164 attackspam
Sep 19 15:34:42 lcprod sshd\[12375\]: Invalid user developer from 104.248.32.164
Sep 19 15:34:42 lcprod sshd\[12375\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.32.164
Sep 19 15:34:44 lcprod sshd\[12375\]: Failed password for invalid user developer from 104.248.32.164 port 51664 ssh2
Sep 19 15:38:46 lcprod sshd\[12767\]: Invalid user teste from 104.248.32.164
Sep 19 15:38:46 lcprod sshd\[12767\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.32.164
2019-09-20 09:43:26
42.99.180.135 attackspambots
Sep 20 04:57:05 www5 sshd\[30708\]: Invalid user simon from 42.99.180.135
Sep 20 04:57:05 www5 sshd\[30708\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=42.99.180.135
Sep 20 04:57:07 www5 sshd\[30708\]: Failed password for invalid user simon from 42.99.180.135 port 46076 ssh2
...
2019-09-20 10:06:33
202.125.53.68 attackbots
Sep 19 15:34:26 php1 sshd\[24758\]: Invalid user admin from 202.125.53.68
Sep 19 15:34:26 php1 sshd\[24758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=u068.d053125202.ctt.ne.jp
Sep 19 15:34:29 php1 sshd\[24758\]: Failed password for invalid user admin from 202.125.53.68 port 53218 ssh2
Sep 19 15:38:52 php1 sshd\[25350\]: Invalid user user from 202.125.53.68
Sep 19 15:38:52 php1 sshd\[25350\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=u068.d053125202.ctt.ne.jp
2019-09-20 09:56:13
109.72.97.66 attack
Sent mail to target address hacked/leaked from abandonia in 2016
2019-09-20 09:52:19
172.104.66.32 attackbotsspam
Sep 19 15:37:34 hiderm sshd\[25552\]: Invalid user vision from 172.104.66.32
Sep 19 15:37:34 hiderm sshd\[25552\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=li1676-32.members.linode.com
Sep 19 15:37:36 hiderm sshd\[25552\]: Failed password for invalid user vision from 172.104.66.32 port 57618 ssh2
Sep 19 15:41:55 hiderm sshd\[26036\]: Invalid user uk from 172.104.66.32
Sep 19 15:41:55 hiderm sshd\[26036\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=li1676-32.members.linode.com
2019-09-20 09:53:14
51.77.140.36 attackspambots
Sep 19 22:17:28 TORMINT sshd\[25918\]: Invalid user gliadin from 51.77.140.36
Sep 19 22:17:28 TORMINT sshd\[25918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.140.36
Sep 19 22:17:30 TORMINT sshd\[25918\]: Failed password for invalid user gliadin from 51.77.140.36 port 35838 ssh2
...
2019-09-20 10:18:53
118.165.113.89 attack
SMB Server BruteForce Attack
2019-09-20 10:16:54
202.129.29.135 attackbotsspam
Brute force attempt
2019-09-20 10:05:39
132.232.19.122 attackbotsspam
2019-09-20 03:34:42,880 fail2ban.actions: WARNING [ssh] Ban 132.232.19.122
2019-09-20 10:07:55
190.82.100.38 attack
Unauthorised access (Sep 20) SRC=190.82.100.38 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=36408 TCP DPT=23 WINDOW=10078 SYN 
Unauthorised access (Sep 16) SRC=190.82.100.38 LEN=40 TOS=0x10 PREC=0x40 TTL=50 ID=65075 TCP DPT=23 WINDOW=43610 SYN
2019-09-20 10:04:19
80.211.209.180 attackbots
Sep 19 22:06:52 ny01 sshd[32085]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.209.180
Sep 19 22:06:54 ny01 sshd[32085]: Failed password for invalid user fubonbank from 80.211.209.180 port 42348 ssh2
Sep 19 22:10:57 ny01 sshd[405]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.211.209.180
2019-09-20 10:14:57

Recently Reported IPs

184.249.69.243 87.55.147.71 11.53.192.103 167.35.241.47
114.170.32.230 107.66.56.142 124.157.2.235 83.199.252.103
52.244.144.210 37.107.108.15 52.8.74.127 80.249.80.6
58.123.163.83 60.6.202.244 209.38.171.120 91.199.187.60
59.42.8.15 53.3.158.55 164.75.42.47 126.191.162.219