Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 38.148.53.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48571
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;38.148.53.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 32 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 05:57:40 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 49.53.148.38.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 38.148.53.49.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
101.231.146.34 attackspambots
SSH Invalid Login
2020-09-26 05:49:20
40.68.90.206 attack
Invalid user git from 40.68.90.206 port 44998
2020-09-26 05:55:37
49.235.83.136 attack
SSH Invalid Login
2020-09-26 06:04:46
193.35.51.23 attackspambots
Sep 25 23:18:53 galaxy event: galaxy/lswi: smtp: fritz.wiesner@wi.uni-potsdam.de [193.35.51.23] authentication failure using internet password
Sep 25 23:18:55 galaxy event: galaxy/lswi: smtp: fritz.wiesner [193.35.51.23] authentication failure using internet password
Sep 25 23:24:06 galaxy event: galaxy/lswi: smtp: eric.krause@wi.uni-potsdam.de [193.35.51.23] authentication failure using internet password
Sep 25 23:24:07 galaxy event: galaxy/lswi: smtp: eric.krause [193.35.51.23] authentication failure using internet password
Sep 25 23:27:59 galaxy event: galaxy/lswi: smtp: fachtagung@wi.uni-potsdam.de [193.35.51.23] authentication failure using internet password
...
2020-09-26 05:35:55
18.224.128.89 attackbotsspam
Blocked by jail apache-security2
2020-09-26 05:39:58
40.85.132.27 attack
SSH Brute Force
2020-09-26 06:07:13
180.164.58.165 attackspam
invalid user
2020-09-26 06:04:28
210.92.18.162 attackbots
lfd: (smtpauth) Failed SMTP AUTH login from 210.92.18.162 (host.webhostingservice.ml): 5 in the last 3600 secs - Wed Sep  5 02:20:04 2018
2020-09-26 05:58:50
198.89.92.162 attackspam
Invalid user hassan from 198.89.92.162 port 51046
2020-09-26 05:37:10
222.186.175.150 attack
Sep 25 23:51:04 vps639187 sshd\[19591\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.150  user=root
Sep 25 23:51:06 vps639187 sshd\[19591\]: Failed password for root from 222.186.175.150 port 57272 ssh2
Sep 25 23:51:09 vps639187 sshd\[19591\]: Failed password for root from 222.186.175.150 port 57272 ssh2
...
2020-09-26 05:58:32
51.116.113.80 attackspambots
SSH Invalid Login
2020-09-26 05:50:02
46.105.167.198 attackspam
SSH Invalid Login
2020-09-26 06:03:06
177.124.195.194 attackbots
Unauthorized connection attempt from IP address 177.124.195.194 on Port 445(SMB)
2020-09-26 05:47:04
60.184.203.145 attack
lfd: (smtpauth) Failed SMTP AUTH login from 60.184.203.145 (145.203.184.60.broad.ls.zj.dynamic.163data.com.cn): 5 in the last 3600 secs - Tue Sep  4 20:15:29 2018
2020-09-26 06:02:45
221.197.216.53 attackspambots
Brute force blocker - service: proftpd1 - aantal: 135 - Wed Sep  5 07:50:14 2018
2020-09-26 05:54:11

Recently Reported IPs

14.125.192.144 30.233.109.246 241.248.34.156 194.10.105.5
238.253.171.23 96.14.225.185 126.136.218.93 33.33.87.249
212.49.93.161 24.168.174.190 47.82.235.47 184.216.135.19
253.202.225.240 86.16.80.105 36.159.182.26 135.143.218.90
12.18.215.166 68.29.169.156 153.190.112.76 194.161.37.52