Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 199.248.48.14
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45375
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;199.248.48.14.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020600 1800 900 604800 86400

;; Query time: 33 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 06 18:32:29 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 14.48.248.199.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 14.48.248.199.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
183.89.237.238 attackspam
B: Magento admin pass test (wrong country)
2020-03-26 21:36:04
49.88.112.69 attackspam
Mar 26 14:10:47 server sshd[8111]: Failed password for root from 49.88.112.69 port 45550 ssh2
Mar 26 14:10:50 server sshd[8111]: Failed password for root from 49.88.112.69 port 45550 ssh2
Mar 26 14:10:53 server sshd[8111]: Failed password for root from 49.88.112.69 port 45550 ssh2
2020-03-26 21:18:36
110.53.234.98 attackbots
ICMP MH Probe, Scan /Distributed -
2020-03-26 21:41:47
129.211.63.79 attack
Invalid user web3 from 129.211.63.79 port 35636
2020-03-26 21:34:51
193.70.37.148 attack
Invalid user publicrelations from 193.70.37.148 port 52282
2020-03-26 21:22:18
12.110.80.154 attack
Attempt to attack host OS, exploiting network vulnerabilities, on 26-03-2020 12:25:09.
2020-03-26 21:50:40
212.64.67.116 attackbots
Invalid user hs from 212.64.67.116 port 49316
2020-03-26 21:19:06
180.76.148.147 attackspam
SSH Brute-Forcing (server2)
2020-03-26 21:42:46
113.88.166.234 attackspam
(sshd) Failed SSH login from 113.88.166.234 (CN/China/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 26 13:25:29 ubnt-55d23 sshd[12020]: Invalid user tt from 113.88.166.234 port 40322
Mar 26 13:25:31 ubnt-55d23 sshd[12020]: Failed password for invalid user tt from 113.88.166.234 port 40322 ssh2
2020-03-26 21:20:35
139.59.18.215 attack
Mar 26 15:08:43 pkdns2 sshd\[63166\]: Invalid user tasia from 139.59.18.215Mar 26 15:08:45 pkdns2 sshd\[63166\]: Failed password for invalid user tasia from 139.59.18.215 port 44902 ssh2Mar 26 15:12:54 pkdns2 sshd\[63363\]: Invalid user thad from 139.59.18.215Mar 26 15:12:56 pkdns2 sshd\[63363\]: Failed password for invalid user thad from 139.59.18.215 port 60166 ssh2Mar 26 15:17:12 pkdns2 sshd\[63586\]: Invalid user chench from 139.59.18.215Mar 26 15:17:14 pkdns2 sshd\[63586\]: Failed password for invalid user chench from 139.59.18.215 port 47206 ssh2
...
2020-03-26 21:29:39
45.119.80.39 attackbots
Invalid user postgres from 45.119.80.39 port 33504
2020-03-26 21:38:10
190.237.172.208 attackspambots
Brute force attempt
2020-03-26 21:43:43
185.175.93.3 attack
03/26/2020-08:25:05.713467 185.175.93.3 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-03-26 22:02:57
109.99.92.154 attack
Email rejected due to spam filtering
2020-03-26 21:46:14
110.53.234.90 attackspambots
ICMP MH Probe, Scan /Distributed -
2020-03-26 22:01:24

Recently Reported IPs

229.67.249.192 161.108.238.225 154.107.143.102 44.56.237.200
41.5.9.240 245.254.6.152 42.25.247.42 109.39.143.86
24.181.61.151 195.188.216.154 79.56.162.158 78.64.199.254
73.35.114.22 249.180.164.127 100.71.97.204 118.239.107.162
50.16.241.117 107.21.13.26 2.100.35.213 229.58.249.91