Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 244.232.99.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 17133
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;244.232.99.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012501 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Jan 26 10:11:27 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 48.99.232.244.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.99.232.244.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
222.186.42.7 attackspambots
May 21 06:38:14 scw-6657dc sshd[8153]: Failed password for root from 222.186.42.7 port 17390 ssh2
May 21 06:38:14 scw-6657dc sshd[8153]: Failed password for root from 222.186.42.7 port 17390 ssh2
May 21 06:38:18 scw-6657dc sshd[8153]: Failed password for root from 222.186.42.7 port 17390 ssh2
...
2020-05-21 14:42:05
91.134.248.230 attack
91.134.248.230 - - [21/May/2020:08:23:13 +0200] "GET /wp-login.php HTTP/1.1" 200 6702 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
91.134.248.230 - - [21/May/2020:08:23:15 +0200] "POST /wp-login.php HTTP/1.1" 200 6953 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
91.134.248.230 - - [21/May/2020:08:23:16 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-21 14:53:01
178.128.183.90 attackbotsspam
Invalid user oed from 178.128.183.90 port 39924
2020-05-21 14:58:37
196.158.129.38 attackbotsspam
20/5/20@23:55:01: FAIL: Alarm-Network address from=196.158.129.38
...
2020-05-21 15:21:43
106.12.113.223 attackspam
Invalid user dds from 106.12.113.223 port 33430
2020-05-21 15:19:19
200.46.203.19 attack
Port probing on unauthorized port 1433
2020-05-21 15:11:48
222.179.126.217 attack
Brute force attempt
2020-05-21 15:23:19
180.76.149.15 attackbots
May 21 07:47:20 OPSO sshd\[15780\]: Invalid user sop from 180.76.149.15 port 59216
May 21 07:47:20 OPSO sshd\[15780\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.149.15
May 21 07:47:22 OPSO sshd\[15780\]: Failed password for invalid user sop from 180.76.149.15 port 59216 ssh2
May 21 07:50:24 OPSO sshd\[16587\]: Invalid user alc from 180.76.149.15 port 33916
May 21 07:50:24 OPSO sshd\[16587\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.76.149.15
2020-05-21 14:47:18
183.89.61.154 attack
Registration form abuse
2020-05-21 14:42:37
139.199.228.133 attackspam
Invalid user gnj from 139.199.228.133 port 37899
2020-05-21 15:06:27
36.133.14.249 attack
May 21 07:34:45 pkdns2 sshd\[29593\]: Invalid user xda from 36.133.14.249May 21 07:34:47 pkdns2 sshd\[29593\]: Failed password for invalid user xda from 36.133.14.249 port 47940 ssh2May 21 07:38:46 pkdns2 sshd\[29831\]: Invalid user wis from 36.133.14.249May 21 07:38:48 pkdns2 sshd\[29831\]: Failed password for invalid user wis from 36.133.14.249 port 37402 ssh2May 21 07:42:59 pkdns2 sshd\[30024\]: Invalid user hot from 36.133.14.249May 21 07:43:01 pkdns2 sshd\[30024\]: Failed password for invalid user hot from 36.133.14.249 port 55096 ssh2
...
2020-05-21 15:04:50
222.186.175.148 attack
May 21 08:42:28 ArkNodeAT sshd\[32072\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
May 21 08:42:30 ArkNodeAT sshd\[32072\]: Failed password for root from 222.186.175.148 port 49916 ssh2
May 21 08:42:46 ArkNodeAT sshd\[32074\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.148  user=root
2020-05-21 14:47:02
178.128.121.137 attackspam
2020-05-21T04:19:18.333983shield sshd\[20895\]: Invalid user hyr from 178.128.121.137 port 56656
2020-05-21T04:19:18.338297shield sshd\[20895\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.137
2020-05-21T04:19:20.166230shield sshd\[20895\]: Failed password for invalid user hyr from 178.128.121.137 port 56656 ssh2
2020-05-21T04:23:17.155705shield sshd\[21864\]: Invalid user gkp from 178.128.121.137 port 34674
2020-05-21T04:23:17.159770shield sshd\[21864\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=178.128.121.137
2020-05-21 15:00:30
212.64.84.215 attack
$f2bV_matches
2020-05-21 15:16:58
129.204.186.151 attackbots
5x Failed Password
2020-05-21 14:51:26

Recently Reported IPs

236.230.15.134 200.133.222.211 132.195.175.181 26.229.74.104
57.167.37.232 125.66.239.103 57.111.111.241 35.65.114.193
42.89.131.26 59.226.88.27 89.174.6.137 171.201.60.90
134.66.250.230 9.115.26.17 33.208.102.120 246.78.14.112
98.161.85.18 245.174.112.215 152.245.171.147 146.9.143.140