Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.104.89.97
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61071
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.104.89.97.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 50 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 21:07:13 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 97.89.104.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 97.89.104.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
58.56.33.221 attackbotsspam
Nov 25 09:36:37 nextcloud sshd\[3380\]: Invalid user sdtdserver from 58.56.33.221
Nov 25 09:36:37 nextcloud sshd\[3380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.56.33.221
Nov 25 09:36:39 nextcloud sshd\[3380\]: Failed password for invalid user sdtdserver from 58.56.33.221 port 40952 ssh2
...
2019-11-25 16:57:36
220.181.108.96 attackbotsspam
Bad bot/spoofed identity
2019-11-25 16:59:31
180.250.125.53 attack
Nov 25 10:16:32 www4 sshd\[13991\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.125.53  user=root
Nov 25 10:16:33 www4 sshd\[13991\]: Failed password for root from 180.250.125.53 port 56900 ssh2
Nov 25 10:24:49 www4 sshd\[14631\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=180.250.125.53  user=root
...
2019-11-25 16:31:16
41.214.139.226 attackspam
Automatic report - Banned IP Access
2019-11-25 16:41:52
117.144.188.222 attackspam
[Mon Nov 25 08:28:09.510146 2019] [access_compat:error] [pid 19899:tid 140690596009728] [client 117.144.188.222:35028] AH01797: client denied by server configuration: /var/www/html/scripts
[Mon Nov 25 08:28:10.229159 2019] [access_compat:error] [pid 19900:tid 140690996012800] [client 117.144.188.222:35404] AH01797: client denied by server configuration: /var/www/html/MyAdmin
[Mon Nov 25 08:28:10.863800 2019] [access_compat:error] [pid 19900:tid 140690646365952] [client 117.144.188.222:35734] AH01797: client denied by server configuration: /var/www/html/mysql
[Mon Nov 25 08:28:11.558693 2019] [access_compat:error] [pid 19899:tid 140690033993472] [client 117.144.188.222:36168] AH01797: client denied by server configuration: /var/www/html/phpmyadmin
[Mon Nov 25 08:28:12.249842 2019] [access_compat:error] [pid 19899:tid 140690000422656] [client 117.144.188.222:36524] AH01797: client denied by server configuration: /var/www/html/pma
...
2019-11-25 16:59:07
49.234.203.221 attackbots
Port scan on 3 port(s): 2375 2376 4243
2019-11-25 16:46:49
130.61.51.26 attackbotsspam
abuse
2019-11-25 16:33:03
35.195.162.205 attackbots
2019-11-25T08:33:38.740641abusebot.cloudsearch.cf sshd\[11710\]: Invalid user admin from 35.195.162.205 port 34138
2019-11-25 16:47:04
114.34.195.231 attackbotsspam
Caught in portsentry honeypot
2019-11-25 16:55:20
157.41.230.46 attack
Unauthorised access (Nov 25) SRC=157.41.230.46 LEN=52 TOS=0x08 PREC=0x20 TTL=48 ID=15493 DF TCP DPT=445 WINDOW=8192 SYN
2019-11-25 16:39:36
185.53.88.76 attackspambots
\[2019-11-25 03:33:17\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-25T03:33:17.061-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="011441519470402",SessionID="0x7f26c4276ea8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.76/55058",ACLName="no_extension_match"
\[2019-11-25 03:33:19\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-25T03:33:19.220-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="011442922550332",SessionID="0x7f26c49cf608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.76/65378",ACLName="no_extension_match"
\[2019-11-25 03:33:26\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-11-25T03:33:26.546-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146406820581",SessionID="0x7f26c4b7dbd8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.76/54633",ACLName="no_extens
2019-11-25 16:52:52
1.214.241.18 attackspambots
Nov 25 09:34:43 markkoudstaal sshd[4651]: Failed password for root from 1.214.241.18 port 43304 ssh2
Nov 25 09:42:15 markkoudstaal sshd[5333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=1.214.241.18
Nov 25 09:42:17 markkoudstaal sshd[5333]: Failed password for invalid user misha from 1.214.241.18 port 51090 ssh2
2019-11-25 16:54:50
182.137.62.75 attackspambots
Nov 25 07:28:14 odroid64 sshd\[20266\]: Invalid user admin from 182.137.62.75
Nov 25 07:28:14 odroid64 sshd\[20266\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.137.62.75
...
2019-11-25 16:56:01
178.32.22.17 attack
RDP Bruteforce
2019-11-25 16:45:49
74.208.94.213 attackbots
Nov 25 09:10:14 mail sshd[12104]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.94.213 
Nov 25 09:10:16 mail sshd[12104]: Failed password for invalid user 777777777 from 74.208.94.213 port 39008 ssh2
Nov 25 09:16:31 mail sshd[13576]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.208.94.213
2019-11-25 16:28:19

Recently Reported IPs

208.25.185.80 13.194.178.44 137.95.49.228 203.3.253.84
55.166.28.151 246.123.92.189 161.211.61.214 114.167.51.76
59.219.66.135 126.201.229.81 132.127.34.60 28.131.140.159
32.90.160.49 16.157.74.104 135.255.129.185 184.39.115.126
58.188.193.42 92.225.107.129 206.34.13.16 148.216.102.61