Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.214.185.136
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 15001
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.214.185.136.			IN	A

;; AUTHORITY SECTION:
.			463	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020300 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 03 20:21:49 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 136.185.214.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 136.185.214.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
201.119.173.7 attack
Port probing on unauthorized port 8081
2020-04-01 08:43:39
120.131.12.247 attackbots
Invalid user wilmott from 120.131.12.247 port 38896
2020-04-01 08:58:21
92.63.194.95 attackspambots
Mar 31 00:20:10 XXX sshd[4514]: Invalid user guest from 92.63.194.95 port 46753
2020-04-01 08:55:25
124.74.137.174 attack
Apr  1 02:03:34 * sshd[32274]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.74.137.174
Apr  1 02:03:36 * sshd[32274]: Failed password for invalid user mc from 124.74.137.174 port 9664 ssh2
2020-04-01 08:39:52
138.197.185.188 attackspambots
$f2bV_matches
2020-04-01 08:58:02
110.39.163.235 attackbotsspam
Brute force SMTP login attempted.
...
2020-04-01 08:45:41
110.44.124.174 attackbotsspam
Brute force SMTP login attempted.
...
2020-04-01 08:38:41
198.199.122.234 attackspambots
k+ssh-bruteforce
2020-04-01 08:57:38
51.75.202.218 attackspam
2020-04-01T01:22:43.956600jannga.de sshd[29930]: Invalid user history from 51.75.202.218 port 36554
2020-04-01T01:22:46.089801jannga.de sshd[29930]: Failed password for invalid user history from 51.75.202.218 port 36554 ssh2
...
2020-04-01 08:27:39
92.63.196.23 attackbots
Mar 31 21:26:56   TCP Attack: SRC=92.63.196.23 DST=[Masked] LEN=40 TOS=0x08 PREC=0x20 TTL=241  PROTO=TCP SPT=52364 DPT=5195 WINDOW=1024 RES=0x00 SYN URGP=0
2020-04-01 08:48:15
110.34.22.42 attackbotsspam
Brute force SMTP login attempted.
...
2020-04-01 08:51:41
134.209.250.204 attack
(sshd) Failed SSH login from 134.209.250.204 (DE/Germany/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  1 01:39:07 srv sshd[6554]: Invalid user kd from 134.209.250.204 port 38286
Apr  1 01:39:10 srv sshd[6554]: Failed password for invalid user kd from 134.209.250.204 port 38286 ssh2
Apr  1 01:50:47 srv sshd[6850]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.250.204  user=root
Apr  1 01:50:49 srv sshd[6850]: Failed password for root from 134.209.250.204 port 42970 ssh2
Apr  1 01:54:17 srv sshd[6931]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.209.250.204  user=root
2020-04-01 08:32:03
110.39.163.244 attack
Brute force SMTP login attempted.
...
2020-04-01 08:45:25
145.239.88.43 attack
Invalid user xieyufen from 145.239.88.43 port 55800
2020-04-01 08:23:41
49.72.111.139 attackbotsspam
Mar 31 23:29:33 mout sshd[5039]: Invalid user joechen from 49.72.111.139 port 58988
2020-04-01 08:24:25

Recently Reported IPs

108.160.193.20 233.83.242.97 198.71.226.23 189.243.170.7
33.208.92.188 201.110.71.227 78.249.26.222 209.140.136.179
11.125.208.121 214.182.123.126 224.176.176.147 207.235.137.18
148.1.135.204 215.161.177.95 93.136.197.67 130.22.89.209
4.200.178.230 142.117.237.39 76.2.85.206 17.143.176.168