Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: Unitymedia NRW GmbH

Hostname: unknown

Organization: unknown

Usage Type: Fixed Line ISP

Comments:
Type Details Datetime
attackbotsspam
Lines containing failures of 37.201.7.48
Nov 19 12:20:25 server01 postfix/smtpd[21854]: connect from ip-37-201-7-48.hsi13.unhostnameymediagroup.de[37.201.7.48]
Nov x@x
Nov x@x
Nov 19 12:20:25 server01 postfix/policy-spf[21859]: : Policy action=550 Please see hxxp://www.openspf.org/Why?s=mfrom;id=911%40iberhardware.com;ip=37.201.7.48;r=server01.2800km.de
Nov x@x
Nov 19 12:20:26 server01 postfix/smtpd[21854]: lost connection after DATA from ip-37-201-7-48.hsi13.unhostnameymediagroup.de[37.201.7.48]
Nov 19 12:20:26 server01 postfix/smtpd[21854]: disconnect from ip-37-201-7-48.hsi13.unhostnameymediagroup.de[37.201.7.48]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=37.201.7.48
2019-11-21 16:54:17
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 37.201.7.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3979
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;37.201.7.48.			IN	A

;; AUTHORITY SECTION:
.			483	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019112003 1800 900 604800 86400

;; Query time: 803 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Nov 21 16:54:13 CST 2019
;; MSG SIZE  rcvd: 115
Host info
48.7.201.37.in-addr.arpa domain name pointer ip-37-201-7-48.hsi13.unitymediagroup.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.7.201.37.in-addr.arpa	name = ip-37-201-7-48.hsi13.unitymediagroup.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
189.210.195.86 attackspam
unauthorized connection attempt
2020-01-17 15:22:19
46.148.44.112 attack
unauthorized connection attempt
2020-01-17 15:36:10
94.244.48.46 attackbots
unauthorized connection attempt
2020-01-17 15:30:08
118.91.187.243 attackspambots
unauthorized connection attempt
2020-01-17 15:06:41
177.206.193.207 attackspam
unauthorized connection attempt
2020-01-17 15:25:50
61.77.114.211 attack
unauthorized connection attempt
2020-01-17 15:34:26
197.44.237.194 attackspambots
Unauthorized connection attempt detected from IP address 197.44.237.194 to port 23 [J]
2020-01-17 15:21:47
14.99.33.122 attackbotsspam
unauthorized connection attempt
2020-01-17 15:15:59
221.8.207.12 attackbotsspam
unauthorized connection attempt
2020-01-17 15:17:56
170.106.74.243 attackspam
Unauthorized connection attempt detected from IP address 170.106.74.243 to port 1947 [J]
2020-01-17 15:27:07
187.73.214.94 attackspambots
unauthorized connection attempt
2020-01-17 15:23:07
82.96.39.13 attackbotsspam
unauthorized connection attempt
2020-01-17 15:11:46
121.54.169.19 attack
Unauthorized connection attempt detected from IP address 121.54.169.19 to port 1433 [J]
2020-01-17 15:06:23
187.154.111.98 attackbots
unauthorized connection attempt
2020-01-17 15:02:44
123.201.61.58 attack
Unauthorized connection attempt detected from IP address 123.201.61.58 to port 445
2020-01-17 15:05:47

Recently Reported IPs

120.151.181.60 125.34.95.75 106.13.122.102 114.243.194.216
3.89.232.230 46.175.67.65 36.68.62.184 119.117.114.76
103.207.80.95 79.140.156.176 1.48.249.88 170.84.59.247
209.45.76.201 172.172.26.144 223.72.249.38 14.169.17.255
152.253.71.116 95.70.218.88 186.7.203.31 176.67.202.13