Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.48.29.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 26494
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.48.29.53.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030901 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 10 11:29:55 CST 2025
;; MSG SIZE  rcvd: 103
Host info
Host 53.29.48.3.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.29.48.3.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
111.53.60.122 attack
Unauthorized connection attempt detected from IP address 111.53.60.122 to port 23
2020-08-02 03:05:55
138.97.28.193 attackbotsspam
Automatic report - Port Scan Attack
2020-08-02 02:45:35
197.2.132.213 attackspambots
Email rejected due to spam filtering
2020-08-02 02:51:19
59.127.20.123 attackbotsspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 02:56:54
167.71.216.37 attackspambots
Wordpress attack
2020-08-02 03:04:30
183.80.48.116 attackspambots
 TCP (SYN) 183.80.48.116:24185 -> port 23, len 44
2020-08-02 03:22:44
81.215.203.68 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-08-02 02:59:45
183.82.51.66 attackbotsspam
20/8/1@08:16:57: FAIL: Alarm-Network address from=183.82.51.66
...
2020-08-02 02:56:33
36.6.57.111 attackspambots
Aug  1 16:19:49 srv01 postfix/smtpd\[26542\]: warning: unknown\[36.6.57.111\]: SASL LOGIN authentication failed: Invalid base64 data in continued response
Aug  1 16:23:01 srv01 postfix/smtpd\[25979\]: warning: unknown\[36.6.57.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 16:23:16 srv01 postfix/smtpd\[25979\]: warning: unknown\[36.6.57.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 16:23:35 srv01 postfix/smtpd\[25979\]: warning: unknown\[36.6.57.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Aug  1 16:24:16 srv01 postfix/smtpd\[25979\]: warning: unknown\[36.6.57.111\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-08-02 03:00:38
89.151.186.152 attack
Aug  1 20:32:14 vmd36147 sshd[12439]: Failed password for root from 89.151.186.152 port 18218 ssh2
Aug  1 20:36:27 vmd36147 sshd[21515]: Failed password for root from 89.151.186.152 port 13740 ssh2
...
2020-08-02 02:52:21
160.226.165.41 attackspambots
Email rejected due to spam filtering
2020-08-02 03:10:59
104.42.124.11 attack
Automatic report - Banned IP Access
2020-08-02 02:51:03
109.67.35.48 attackbots
Email rejected due to spam filtering
2020-08-02 02:46:22
175.176.38.150 attackbotsspam
Email rejected due to spam filtering
2020-08-02 03:15:21
122.51.227.65 attackspam
Aug  1 15:11:33 vps46666688 sshd[32358]: Failed password for root from 122.51.227.65 port 58440 ssh2
...
2020-08-02 03:24:28

Recently Reported IPs

148.3.101.130 120.37.139.49 31.180.201.79 19.184.69.110
93.180.64.215 243.249.116.104 199.176.252.93 135.50.152.52
84.17.19.102 250.101.212.245 83.225.201.7 89.95.27.73
245.20.127.236 155.71.227.46 143.46.214.145 219.42.178.176
130.104.254.59 80.178.143.229 78.110.122.5 249.191.173.166