Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Brazil

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.239.149.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3649
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.239.149.48.			IN	A

;; AUTHORITY SECTION:
.			337	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 169 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 14:57:29 CST 2022
;; MSG SIZE  rcvd: 106
Host info
48.149.239.45.in-addr.arpa domain name pointer 48-149-239-45.wisesite.net.br.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.149.239.45.in-addr.arpa	name = 48-149-239-45.wisesite.net.br.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
175.169.172.11 attack
Telnet Server BruteForce Attack
2020-02-25 05:29:10
177.101.128.131 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-02-25 05:54:44
92.63.194.104 attackbotsspam
Feb 24 22:28:15 OPSO sshd\[30101\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.104  user=admin
Feb 24 22:28:18 OPSO sshd\[30101\]: Failed password for admin from 92.63.194.104 port 41629 ssh2
Feb 24 22:28:30 OPSO sshd\[30114\]: Invalid user test from 92.63.194.104 port 34305
Feb 24 22:28:30 OPSO sshd\[30114\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.104
Feb 24 22:28:32 OPSO sshd\[30114\]: Failed password for invalid user test from 92.63.194.104 port 34305 ssh2
2020-02-25 05:42:48
218.92.0.191 attackspambots
Feb 24 22:56:09 dcd-gentoo sshd[18517]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Feb 24 22:56:11 dcd-gentoo sshd[18517]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Feb 24 22:56:09 dcd-gentoo sshd[18517]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Feb 24 22:56:11 dcd-gentoo sshd[18517]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Feb 24 22:56:09 dcd-gentoo sshd[18517]: User root from 218.92.0.191 not allowed because none of user's groups are listed in AllowGroups
Feb 24 22:56:11 dcd-gentoo sshd[18517]: error: PAM: Authentication failure for illegal user root from 218.92.0.191
Feb 24 22:56:11 dcd-gentoo sshd[18517]: Failed keyboard-interactive/pam for invalid user root from 218.92.0.191 port 63961 ssh2
...
2020-02-25 06:09:46
117.193.67.175 attackspambots
1582550346 - 02/24/2020 14:19:06 Host: 117.193.67.175/117.193.67.175 Port: 445 TCP Blocked
2020-02-25 05:37:59
79.124.62.42 attackspambots
[portscan] Port scan
2020-02-25 05:48:11
219.154.66.223 attackspambots
IMAP
2020-02-25 06:02:24
195.54.166.33 attack
Feb 24 22:40:10 debian-2gb-nbg1-2 kernel: \[4839609.960782\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=195.54.166.33 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=246 ID=37788 PROTO=TCP SPT=8080 DPT=6523 WINDOW=1024 RES=0x00 SYN URGP=0
2020-02-25 05:40:48
142.93.51.33 attack
20 attempts against mh-ssh on cell
2020-02-25 05:39:15
17.248.176.10 attackbotsspam
firewall-block, port(s): 53162/tcp
2020-02-25 06:02:11
118.71.208.249 bots
Unauthorized access
2020-02-25 05:31:38
185.232.67.5 attack
Feb 24 23:00:39 dedicated sshd[18212]: Invalid user admin from 185.232.67.5 port 44566
2020-02-25 06:04:22
112.85.42.186 attack
auto-add
2020-02-25 06:01:38
27.72.73.25 attack
Unauthorized connection attempt from IP address 27.72.73.25 on Port 445(SMB)
2020-02-25 06:08:01
200.7.8.130 attack
Unauthorized connection attempt from IP address 200.7.8.130 on Port 445(SMB)
2020-02-25 06:03:31

Recently Reported IPs

67.21.36.224 193.233.230.235 139.59.2.22 45.120.201.157
180.106.116.227 20.0.197.206 142.93.136.193 103.27.229.44
149.129.130.68 43.153.80.75 174.138.42.119 109.248.6.64
197.56.153.38 5.88.113.46 64.71.155.137 43.153.85.217
103.111.23.36 197.62.40.243 176.114.0.175 43.143.153.5