Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 215.209.48.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27430
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;215.209.48.54.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021902 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 20 08:06:48 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 54.48.209.215.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 215.209.48.54.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
117.92.195.88 attackbots
Unauthorized connection attempt detected from IP address 117.92.195.88 to port 9530
2020-05-31 02:34:20
60.12.221.84 attack
May 30 14:08:11 vps639187 sshd\[20919\]: Invalid user nalini from 60.12.221.84 port 46980
May 30 14:08:11 vps639187 sshd\[20919\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.12.221.84
May 30 14:08:13 vps639187 sshd\[20919\]: Failed password for invalid user nalini from 60.12.221.84 port 46980 ssh2
...
2020-05-31 01:59:35
95.92.110.33 attackspam
Unauthorized connection attempt detected from IP address 95.92.110.33 to port 8080
2020-05-31 02:36:46
122.147.22.213 attackspam
Port probing on unauthorized port 23
2020-05-31 02:08:38
49.51.160.47 attackbotsspam
Unauthorized connection attempt detected from IP address 49.51.160.47 to port 19
2020-05-31 02:39:56
112.113.132.103 attackspambots
Unauthorized connection attempt detected from IP address 112.113.132.103 to port 23
2020-05-31 02:35:04
196.3.193.45 attackspambots
Unauthorized connection attempt detected from IP address 196.3.193.45 to port 23
2020-05-31 02:22:57
222.186.15.115 attackspambots
May 30 20:04:09 *host* sshd\[9841\]: User *user* from 222.186.15.115 not allowed because none of user's groups are listed in AllowGroups
2020-05-31 02:05:11
213.170.247.233 attack
Unauthorized connection attempt detected from IP address 213.170.247.233 to port 8080
2020-05-31 02:20:59
119.202.104.190 attack
Unauthorized connection attempt detected from IP address 119.202.104.190 to port 23
2020-05-31 02:31:28
112.184.237.244 attackbots
Unauthorized connection attempt detected from IP address 112.184.237.244 to port 80
2020-05-31 02:34:46
54.213.242.91 attack
30.05.2020 14:07:52 - Bad Robot 
Ignore Robots.txt
2020-05-31 02:13:18
99.231.210.28 attack
May 30 17:52:52 piServer sshd[16223]: Failed password for root from 99.231.210.28 port 42968 ssh2
May 30 17:55:10 piServer sshd[16396]: Failed password for root from 99.231.210.28 port 48362 ssh2
...
2020-05-31 02:16:49
163.53.185.93 attack
Unauthorized connection attempt detected from IP address 163.53.185.93 to port 445
2020-05-31 02:27:33
1.213.182.68 attack
k+ssh-bruteforce
2020-05-31 02:17:20

Recently Reported IPs

153.33.19.81 253.5.39.66 43.132.125.183 95.164.201.232
96.173.160.16 166.85.43.153 141.161.44.8 114.73.0.239
89.202.173.51 119.181.158.65 66.88.41.207 88.45.255.31
219.224.64.24 9.10.138.235 107.55.23.233 36.14.128.220
75.98.230.156 131.223.133.232 241.239.253.48 91.28.129.44