Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Rome

Region: Regione Lazio

Country: Italy

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.47.197.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50321
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.47.197.48.			IN	A

;; AUTHORITY SECTION:
.			303	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024040700 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Apr 07 17:02:07 CST 2024
;; MSG SIZE  rcvd: 104
Host info
48.197.47.2.in-addr.arpa domain name pointer net-2-47-197-48.cust.vodafonedsl.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.197.47.2.in-addr.arpa	name = net-2-47-197-48.cust.vodafonedsl.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
106.12.189.89 attackbots
May 16 04:47:57 server sshd[4787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.189.89
May 16 04:47:59 server sshd[4787]: Failed password for invalid user user from 106.12.189.89 port 37588 ssh2
May 16 04:50:15 server sshd[5029]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.189.89
...
2020-05-16 12:08:42
185.220.101.202 attack
SSH brutforce
2020-05-16 12:10:34
219.153.31.186 attack
May 16 04:31:54 server sshd[3356]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=219.153.31.186
May 16 04:31:57 server sshd[3356]: Failed password for invalid user falcon from 219.153.31.186 port 56237 ssh2
May 16 04:36:19 server sshd[3730]: Failed password for root from 219.153.31.186 port 56912 ssh2
...
2020-05-16 12:21:52
177.139.195.214 attack
2020-05-16T01:09:58.875538abusebot-2.cloudsearch.cf sshd[7813]: Invalid user zxcv from 177.139.195.214 port 58996
2020-05-16T01:09:58.883824abusebot-2.cloudsearch.cf sshd[7813]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.195.214
2020-05-16T01:09:58.875538abusebot-2.cloudsearch.cf sshd[7813]: Invalid user zxcv from 177.139.195.214 port 58996
2020-05-16T01:10:01.107320abusebot-2.cloudsearch.cf sshd[7813]: Failed password for invalid user zxcv from 177.139.195.214 port 58996 ssh2
2020-05-16T01:14:48.538008abusebot-2.cloudsearch.cf sshd[7908]: Invalid user bob from 177.139.195.214 port 40552
2020-05-16T01:14:48.546167abusebot-2.cloudsearch.cf sshd[7908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=177.139.195.214
2020-05-16T01:14:48.538008abusebot-2.cloudsearch.cf sshd[7908]: Invalid user bob from 177.139.195.214 port 40552
2020-05-16T01:14:50.247740abusebot-2.cloudsearch.cf sshd[7908]: Failed 
...
2020-05-16 12:14:02
139.155.17.13 attack
Invalid user jca from 139.155.17.13 port 40368
2020-05-16 12:04:50
92.118.37.83 attackbots
Port scan on 8 port(s): 2200 4000 4488 9444 34444 36363 36666 48999
2020-05-16 12:00:53
93.103.140.118 attack
Attempted Remote Command Execution via Shell Script
2020-05-16 08:54:03
49.145.233.9 attackbots
Wordpress login attempts
2020-05-16 12:10:04
49.234.87.24 attackbots
Invalid user wangk from 49.234.87.24 port 35544
2020-05-16 12:13:36
212.232.55.233 attackbots
Brute forcing RDP port 3389
2020-05-16 08:58:36
71.38.84.147 attackspambots
Attempted connection to port 2323.
2020-05-16 08:52:38
42.104.97.228 attackbotsspam
May 15 18:15:53 Host-KLAX-C sshd[11047]: Invalid user test from 42.104.97.228 port 24605
...
2020-05-16 12:17:40
163.44.150.247 attack
SSH-BruteForce
2020-05-16 12:06:45
85.152.101.106 attack
Attempted connection to port 5555.
2020-05-16 08:50:45
112.196.97.85 attackspambots
Fail2Ban - SSH Bruteforce Attempt
2020-05-16 12:08:29

Recently Reported IPs

3.1.201.148 3.1.107.234 3.1.200.60 3.1.196.166
2.0.214.116 3.1.101.158 3.7.7.129 3.6.187.95
3.7.10.0 3.6.189.2 3.7.11.27 3.7.10.70
3.6.156.119 3.6.114.236 3.6.165.132 2.56.73.155
2.56.74.94 2.56.74.192 164.23.129.241 64.23.129.241