Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Birmingham

Region: Alabama

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 47.48.150.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23638
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;47.48.150.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121700 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Dec 17 14:25:47 CST 2025
;; MSG SIZE  rcvd: 106
Host info
145.150.48.47.in-addr.arpa domain name pointer syn-047-048-150-145.biz.spectrum.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.150.48.47.in-addr.arpa	name = syn-047-048-150-145.biz.spectrum.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
162.247.73.192 attack
[ssh] SSH attack
2019-07-28 19:59:02
176.108.100.165 attack
Jul 28 11:30:26 localhost sshd\[27678\]: Invalid user user1 from 176.108.100.165 port 52972
Jul 28 11:30:30 localhost sshd\[27678\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=176.108.100.165
Jul 28 11:30:33 localhost sshd\[27678\]: Failed password for invalid user user1 from 176.108.100.165 port 52972 ssh2
...
2019-07-28 20:21:42
119.95.227.198 attackspam
Unauthorized connection attempt from IP address 119.95.227.198 on Port 445(SMB)
2019-07-28 19:58:37
119.81.31.20 attackbotsspam
ThinkPHP Remote Code Execution Vulnerability
2019-07-28 20:28:47
200.3.184.202 attack
Joomla HTTP User Agent Object Injection Vulnerability
2019-07-28 20:26:42
36.67.99.203 attack
Unauthorized connection attempt from IP address 36.67.99.203 on Port 445(SMB)
2019-07-28 20:10:55
152.32.128.223 attack
ZmEu Scanner Detection
2019-07-28 20:34:04
115.186.173.210 attackbots
3389BruteforceFW23
2019-07-28 20:42:11
206.189.145.152 attack
Invalid user zimbra from 206.189.145.152 port 41975
2019-07-28 20:03:02
194.44.15.194 attack
Unauthorized connection attempt from IP address 194.44.15.194 on Port 445(SMB)
2019-07-28 19:51:08
90.154.109.54 attackbots
Unauthorized connection attempt from IP address 90.154.109.54 on Port 445(SMB)
2019-07-28 19:55:32
202.205.84.51 attackbotsspam
Unauthorized connection attempt from IP address 202.205.84.51 on Port 445(SMB)
2019-07-28 20:08:02
181.57.133.130 attack
Jul 28 13:25:32 v22018076622670303 sshd\[23028\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.57.133.130  user=root
Jul 28 13:25:33 v22018076622670303 sshd\[23028\]: Failed password for root from 181.57.133.130 port 39212 ssh2
Jul 28 13:30:19 v22018076622670303 sshd\[23038\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=181.57.133.130  user=root
...
2019-07-28 20:39:04
107.148.101.187 attackbots
Unauthorized connection attempt from IP address 107.148.101.187 on Port 445(SMB)
2019-07-28 20:29:39
110.45.145.178 attackbotsspam
Automatic report - Banned IP Access
2019-07-28 19:46:59

Recently Reported IPs

174.140.36.33 28.151.145.131 76.54.1.142 10.229.106.111
132.235.174.229 163.152.25.97 168.88.204.44 59.103.44.163
249.27.79.234 148.10.97.179 79.41.59.200 43.77.125.119
0.19.45.93 208.171.75.73 138.128.34.1 97.189.98.172
13.55.228.197 136.127.164.207 230.111.159.208 85.23.112.198