Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 207.106.48.219
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6592
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;207.106.48.219.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020500 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 14:19:28 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 219.48.106.207.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 219.48.106.207.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
1.36.85.246 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-18 02:34:30
107.216.45.99 attackspam
port scan and connect, tcp 443 (https)
2020-09-18 02:56:23
120.142.60.230 attackbots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-18 02:48:03
64.202.186.78 attackbots
(sshd) Failed SSH login from 64.202.186.78 (US/United States/ip-64-202-186-78.secureserver.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 17 12:47:56 optimus sshd[27028]: Invalid user minecraftserver from 64.202.186.78
Sep 17 12:47:56 optimus sshd[27028]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.202.186.78 
Sep 17 12:47:58 optimus sshd[27028]: Failed password for invalid user minecraftserver from 64.202.186.78 port 38058 ssh2
Sep 17 13:02:20 optimus sshd[31189]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.202.186.78  user=cpanel
Sep 17 13:02:22 optimus sshd[31189]: Failed password for cpanel from 64.202.186.78 port 58226 ssh2
2020-09-18 02:23:52
189.165.63.17 attackbotsspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-18 02:30:58
189.89.213.148 attackbotsspam
Attempted Brute Force (dovecot)
2020-09-18 02:37:20
138.186.156.85 attack
1600364187 - 09/17/2020 19:36:27 Host: 138.186.156.85/138.186.156.85 Port: 445 TCP Blocked
2020-09-18 02:37:53
112.85.42.180 attack
2020-09-17T18:36:50.097343abusebot-6.cloudsearch.cf sshd[23752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
2020-09-17T18:36:51.998824abusebot-6.cloudsearch.cf sshd[23752]: Failed password for root from 112.85.42.180 port 42575 ssh2
2020-09-17T18:36:54.913641abusebot-6.cloudsearch.cf sshd[23752]: Failed password for root from 112.85.42.180 port 42575 ssh2
2020-09-17T18:36:50.097343abusebot-6.cloudsearch.cf sshd[23752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.180  user=root
2020-09-17T18:36:51.998824abusebot-6.cloudsearch.cf sshd[23752]: Failed password for root from 112.85.42.180 port 42575 ssh2
2020-09-17T18:36:54.913641abusebot-6.cloudsearch.cf sshd[23752]: Failed password for root from 112.85.42.180 port 42575 ssh2
2020-09-17T18:36:50.097343abusebot-6.cloudsearch.cf sshd[23752]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruse
...
2020-09-18 02:41:47
45.148.121.83 attackbots
Excessive Port-Scanning
2020-09-18 02:29:58
36.155.113.40 attackbots
Sep 17 22:32:39 lunarastro sshd[23904]: Failed password for root from 36.155.113.40 port 57461 ssh2
2020-09-18 02:50:23
66.249.65.122 attack
Automatic report - Banned IP Access
2020-09-18 02:51:18
140.143.25.65 attackbots
Sep 17 20:28:01 piServer sshd[18129]: Failed password for root from 140.143.25.65 port 58776 ssh2
Sep 17 20:30:33 piServer sshd[18395]: Failed password for root from 140.143.25.65 port 33322 ssh2
Sep 17 20:33:09 piServer sshd[18664]: Failed password for root from 140.143.25.65 port 36106 ssh2
...
2020-09-18 02:57:01
118.218.179.126 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-18 02:48:26
31.142.61.155 attack
1600362142 - 09/17/2020 19:02:22 Host: 31.142.61.155/31.142.61.155 Port: 445 TCP Blocked
2020-09-18 02:30:21
122.202.32.70 attack
Sep 17 14:16:41 NPSTNNYC01T sshd[9182]: Failed password for root from 122.202.32.70 port 35174 ssh2
Sep 17 14:20:22 NPSTNNYC01T sshd[9483]: Failed password for root from 122.202.32.70 port 47816 ssh2
...
2020-09-18 02:39:35

Recently Reported IPs

134.142.123.147 23.132.11.119 234.139.86.25 163.147.70.104
209.34.49.131 4.108.25.101 107.65.206.40 139.93.28.173
130.213.5.186 198.78.45.71 33.12.126.45 180.122.50.194
216.235.225.158 138.76.77.131 245.132.118.29 189.86.74.193
216.11.84.114 176.154.101.97 127.134.35.186 15.49.3.23