Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 26.214.48.61
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 42428
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;26.214.48.61.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 02:35:58 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 61.48.214.26.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 61.48.214.26.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
179.108.244.167 attackbots
dovecot jail - smtp auth [ma]
2019-06-24 09:32:57
103.113.102.145 attackbots
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-23 21:53:32]
2019-06-24 10:04:47
185.53.88.17 attackspambots
" "
2019-06-24 10:04:26
171.244.43.172 attack
Jun 24 01:13:40 OPSO sshd\[13358\]: Invalid user git from 171.244.43.172 port 50014
Jun 24 01:13:40 OPSO sshd\[13358\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.172
Jun 24 01:13:42 OPSO sshd\[13358\]: Failed password for invalid user git from 171.244.43.172 port 50014 ssh2
Jun 24 01:23:35 OPSO sshd\[14085\]: Invalid user git from 171.244.43.172 port 33892
Jun 24 01:23:35 OPSO sshd\[14085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.244.43.172
2019-06-24 10:10:20
186.224.171.22 attack
SMTP-sasl brute force
...
2019-06-24 10:08:42
165.22.121.1 attackspambots
[portscan] Port scan
2019-06-24 10:10:02
36.111.191.73 attack
Trying ports that it shouldn't be.
2019-06-24 09:59:29
216.218.206.67 attackbots
GET / HTTP/1.1
2019-06-24 09:45:39
178.128.57.53 attackspam
scan z
2019-06-24 09:35:36
121.40.108.57 attack
fail2ban honeypot
2019-06-24 09:53:04
36.226.247.129 attackbotsspam
Unauthorised access (Jun 23) SRC=36.226.247.129 LEN=52 PREC=0x20 TTL=117 ID=13565 DF TCP DPT=445 WINDOW=8192 SYN
2019-06-24 09:52:42
180.174.197.253 attackspambots
TCP port 445 (SMB) attempt blocked by firewall. [2019-06-23 21:52:46]
2019-06-24 10:17:03
89.210.161.193 attackspam
Telnet Server BruteForce Attack
2019-06-24 09:38:37
187.250.187.153 attackbotsspam
Telnet Server BruteForce Attack
2019-06-24 09:33:57
197.34.178.31 attack
1561319755 - 06/24/2019 02:55:55 Host: host-197.34.178.31.tedata.net/197.34.178.31 Port: 23 TCP Blocked
...
2019-06-24 09:51:18

Recently Reported IPs

185.133.17.47 238.190.183.138 63.176.58.2 138.92.245.199
26.110.19.32 80.218.228.205 230.76.32.220 104.182.54.74
185.2.125.195 59.207.32.21 223.39.233.78 75.91.10.202
214.13.47.62 29.182.247.192 58.136.248.3 12.40.183.37
94.184.230.61 73.173.37.250 9.17.187.115 173.192.219.169