Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Osaka

Region: Osaka

Country: Japan

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 40.197.85.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 30501
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;40.197.85.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 01:30:37 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 48.85.197.40.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.85.197.40.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
14.231.216.208 attackspam
Unauthorized connection attempt from IP address 14.231.216.208 on Port 445(SMB)
2019-08-07 16:19:08
188.166.159.148 attack
[Aegis] @ 2019-08-07 08:03:08  0100 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-08-07 15:49:00
85.209.0.11 attack
Multiport scan : 290 ports scanned 10094 10235 10439 11191 13088 13293 13948 14008 14062 14109 14148 14194 14398 14602 14620 14764 15087 15288 15420 17502 17513 17749 17750 17793 17909 18145 18156 18200 18244 18286 18405 18417 18868 18944 19047 19115 19189 19455 19511 19975 20254 20458 20544 20650 20654 20679 20683 20717 20866 21081 21114 21306 21404 21447 21522 21608 21628 21715 21918 22246 22329 22435 22487 22510 22536 22592 22648 .....
2019-08-07 16:46:00
185.175.93.18 attack
Port scan on 3 port(s): 463 4703 5423
2019-08-07 16:22:47
103.125.190.110 attack
>30 unauthorized SSH connections
2019-08-07 16:08:37
103.140.83.18 attackspambots
SSH Bruteforce
2019-08-07 16:10:19
98.6.214.182 attack
NAME : RCSW CIDR : 98.6.0.0/16 SYN Flood DDoS Attack USA - Colorado - block certain countries :) IP: 98.6.214.182  Denial-of-Service Attack (DoS) Detected and Blocked by ADMIN  - data recovery https://help-dysk.pl
2019-08-07 16:36:33
190.50.27.191 attackspambots
[portscan] Port scan
2019-08-07 15:45:32
83.169.197.13 attack
Unauthorized connection attempt from IP address 83.169.197.13 on Port 445(SMB)
2019-08-07 16:37:22
103.89.90.87 attackbotsspam
>40 unauthorized SSH connections
2019-08-07 16:17:31
186.84.174.240 attackbotsspam
Aug  7 08:17:18 localhost sshd\[49373\]: Invalid user grace from 186.84.174.240 port 57557
Aug  7 08:17:18 localhost sshd\[49373\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.174.240
Aug  7 08:17:20 localhost sshd\[49373\]: Failed password for invalid user grace from 186.84.174.240 port 57557 ssh2
Aug  7 08:22:43 localhost sshd\[49528\]: Invalid user martha from 186.84.174.240 port 62645
Aug  7 08:22:43 localhost sshd\[49528\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.84.174.240
...
2019-08-07 16:44:11
119.233.143.21 attackspam
2019-08-07 08:48:30 H=(4mt7g5z.jkb) [119.233.143.21]:7177 I=[10.100.18.25]:25 sender verify fail for : Unrouteable address
2019-08-07 x@x
2019-08-07 08:48:31 unexpected disconnection while reading SMTP command from (4mt7g5z.jkb) [119.233.143.21]:7177 I=[10.100.18.25]:25


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=119.233.143.21
2019-08-07 16:45:07
91.134.170.118 attackbotsspam
Aug  7 10:25:40 vps01 sshd[20080]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=91.134.170.118
Aug  7 10:25:42 vps01 sshd[20080]: Failed password for invalid user alice from 91.134.170.118 port 57974 ssh2
2019-08-07 16:34:51
167.99.125.233 attackbotsspam
SSH Bruteforce
2019-08-07 16:41:41
173.234.158.180 attackbots
US bad_bot
2019-08-07 15:51:52

Recently Reported IPs

159.94.122.69 133.88.71.172 28.182.42.206 77.126.67.250
127.179.205.44 47.216.220.37 23.39.134.48 31.233.174.167
94.51.216.185 170.149.137.194 14.127.47.166 188.49.35.132
185.220.95.218 118.88.206.140 36.31.101.21 2.117.36.202
133.8.168.175 250.196.216.177 243.73.133.109 52.154.7.37