Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 33.48.94.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36737
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;33.48.94.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021800 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 18 23:29:59 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 145.94.48.33.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 33.48.94.145.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
148.66.135.152 attackspambots
Automatic report - XMLRPC Attack
2019-10-15 23:49:59
81.130.138.156 attackspam
Oct 15 14:43:56 MK-Soft-Root1 sshd[31513]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=81.130.138.156 
Oct 15 14:43:58 MK-Soft-Root1 sshd[31513]: Failed password for invalid user com!@# from 81.130.138.156 port 58478 ssh2
...
2019-10-15 23:17:39
109.0.197.237 attackbots
Oct 15 17:36:08 OPSO sshd\[23764\]: Invalid user vfrcde from 109.0.197.237 port 33374
Oct 15 17:36:08 OPSO sshd\[23764\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.0.197.237
Oct 15 17:36:10 OPSO sshd\[23764\]: Failed password for invalid user vfrcde from 109.0.197.237 port 33374 ssh2
Oct 15 17:40:19 OPSO sshd\[24499\]: Invalid user l123 from 109.0.197.237 port 45530
Oct 15 17:40:19 OPSO sshd\[24499\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=109.0.197.237
2019-10-15 23:45:25
51.38.95.12 attackspam
Oct 15 17:06:53 lnxded64 sshd[19808]: Failed password for root from 51.38.95.12 port 59974 ssh2
Oct 15 17:06:53 lnxded64 sshd[19808]: Failed password for root from 51.38.95.12 port 59974 ssh2
2019-10-15 23:26:12
85.104.111.127 attackbots
Unauthorised access (Oct 15) SRC=85.104.111.127 LEN=52 TTL=111 ID=23465 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-15 23:30:34
80.82.77.33 attackspambots
Multiple attempts to access non-existent resource: /.well-known/security.txt
2019-10-15 23:28:11
128.199.107.252 attackspambots
Oct 15 16:01:48 hosting sshd[23196]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.107.252  user=root
Oct 15 16:01:50 hosting sshd[23196]: Failed password for root from 128.199.107.252 port 36812 ssh2
...
2019-10-15 23:19:49
95.213.181.6 attackspambots
Oct 15 17:05:43 server sshd[61738]: Failed password for root from 95.213.181.6 port 40304 ssh2
Oct 15 17:26:47 server sshd[1155]: Failed password for invalid user tests from 95.213.181.6 port 44330 ssh2
Oct 15 17:30:36 server sshd[1968]: Failed password for root from 95.213.181.6 port 19928 ssh2
2019-10-15 23:42:00
175.207.219.185 attackbotsspam
Oct 15 16:25:08 lnxmail61 sshd[13954]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.207.219.185
2019-10-15 23:15:26
36.37.115.106 attackspambots
Oct 15 10:05:09 ny01 sshd[19298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.37.115.106
Oct 15 10:05:11 ny01 sshd[19298]: Failed password for invalid user xpidc from 36.37.115.106 port 46224 ssh2
Oct 15 10:10:15 ny01 sshd[19721]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.37.115.106
2019-10-15 23:35:05
35.241.95.11 attack
Oct 15 03:01:35 sachi sshd\[21085\]: Invalid user support from 35.241.95.11
Oct 15 03:01:35 sachi sshd\[21085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=11.95.241.35.bc.googleusercontent.com
Oct 15 03:01:36 sachi sshd\[21085\]: Failed password for invalid user support from 35.241.95.11 port 46864 ssh2
Oct 15 03:07:39 sachi sshd\[21556\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=11.95.241.35.bc.googleusercontent.com  user=root
Oct 15 03:07:41 sachi sshd\[21556\]: Failed password for root from 35.241.95.11 port 59362 ssh2
2019-10-15 23:44:26
222.186.175.217 attackbots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-10-15 23:17:10
207.180.198.241 attackbots
15.10.2019 15:17:57 - Wordpress fail 
Detected by ELinOX-ALM
2019-10-15 23:42:26
113.111.83.204 attack
C1,WP HEAD /wp-login.php
2019-10-15 23:25:51
103.29.187.254 attackbotsspam
www noscript
...
2019-10-15 23:40:54

Recently Reported IPs

247.205.148.95 43.249.156.0 68.104.46.100 71.47.195.32
70.212.219.106 126.179.108.14 247.134.124.193 90.39.97.17
254.66.240.25 70.3.209.65 21.135.87.145 76.243.135.107
244.63.184.97 44.238.64.242 54.231.151.166 177.201.50.45
65.255.24.39 142.26.77.25 32.180.156.174 109.233.171.100