Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hamburg

Region: Hamburg

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.214.39.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 11806
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.214.39.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 75 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 12:47:25 CST 2025
;; MSG SIZE  rcvd: 104
Host info
48.39.214.2.in-addr.arpa domain name pointer dynamic-002-214-039-048.2.214.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.39.214.2.in-addr.arpa	name = dynamic-002-214-039-048.2.214.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
112.21.188.250 attackbotsspam
Unauthorized connection attempt detected from IP address 112.21.188.250 to port 22
2020-01-11 18:52:17
103.127.108.81 attackspambots
Jan 11 05:49:15 grey postfix/smtpd\[10764\]: NOQUEUE: reject: RCPT from unknown\[103.127.108.81\]: 554 5.7.1 Service unavailable\; Client host \[103.127.108.81\] blocked using truncate.gbudb.net\; http://www.gbudb.com/truncate/ \[103.127.108.81\]\; from=\ to=\ proto=ESMTP helo=\<\[103.127.108.81\]\>
...
2020-01-11 18:53:54
222.186.30.76 attackbots
Brute-force attempt banned
2020-01-11 18:42:00
113.175.118.70 attackspambots
Unauthorized connection attempt detected from IP address 113.175.118.70 to port 445
2020-01-11 18:56:41
122.155.11.89 attackbotsspam
Jan 11 11:36:09 amit sshd\[2225\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.11.89  user=root
Jan 11 11:36:11 amit sshd\[2225\]: Failed password for root from 122.155.11.89 port 56826 ssh2
Jan 11 11:38:34 amit sshd\[2242\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.155.11.89  user=root
...
2020-01-11 19:00:39
211.149.238.50 attackspambots
Automatic report - XMLRPC Attack
2020-01-11 19:05:25
167.99.75.174 attackspam
Invalid user postgres from 167.99.75.174 port 52102
2020-01-11 19:16:00
41.82.208.182 attack
$f2bV_matches
2020-01-11 19:11:28
89.163.209.26 attackbots
Jan 11 07:12:58 vpn01 sshd[14252]: Failed password for root from 89.163.209.26 port 43324 ssh2
...
2020-01-11 19:10:55
103.253.153.162 attackspambots
Automatic report - Port Scan Attack
2020-01-11 19:07:40
103.141.246.130 attackspambots
Unauthorized connection attempt from IP address 103.141.246.130 on Port 445(SMB)
2020-01-11 19:16:54
92.63.194.26 attackspambots
DATE:2020-01-11 10:58:47, IP:92.63.194.26, PORT:ssh SSH brute force auth on honeypot server (honey-neo-dc)
2020-01-11 19:02:09
79.166.28.187 attackbots
Telnet Server BruteForce Attack
2020-01-11 18:43:42
183.81.121.46 attack
Unauthorized connection attempt from IP address 183.81.121.46 on Port 445(SMB)
2020-01-11 19:19:15
201.150.54.233 attackspam
Unauthorized connection attempt detected from IP address 201.150.54.233 to port 8080
2020-01-11 18:55:14

Recently Reported IPs

36.131.236.68 88.93.57.206 37.158.15.208 19.155.50.75
254.15.9.230 161.229.251.178 241.185.243.43 161.30.14.79
155.61.59.85 162.246.221.102 141.121.232.67 8.89.38.146
49.185.54.144 38.17.203.82 216.42.31.118 221.191.57.232
5.174.178.34 7.234.218.70 178.177.65.22 118.196.16.145