Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.217.114.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40411
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.217.114.234.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020302 1800 900 604800 86400

;; Query time: 36 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 10:41:33 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 234.114.217.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.114.217.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
45.151.254.234 attack
1111/udp 2222/udp 3333/udp...
[2020-03-27/05-27]195pkt,16pt.(tcp),20pt.(udp)
2020-05-28 06:49:47
179.49.60.210 attackbotsspam
Web Attack: Draytek Routers CVE-2020-8515
2020-05-28 06:34:32
159.138.117.89 attackbotsspam
xmlrpc attack
2020-05-28 06:52:16
191.6.90.195 attackbots
Email rejected due to spam filtering
2020-05-28 06:30:27
194.105.137.173 attackspambots
20/5/27@14:17:21: FAIL: Alarm-Network address from=194.105.137.173
...
2020-05-28 06:24:53
45.188.1.134 attack
Unauthorized connection attempt from IP address 45.188.1.134 on Port 445(SMB)
2020-05-28 06:47:14
198.98.58.23 attackbotsspam
Tor exit node
2020-05-28 06:33:54
49.235.73.150 attackbots
Invalid user bmike from 49.235.73.150 port 41150
2020-05-28 06:28:17
61.95.233.61 attack
May 28 00:24:13 vps sshd[146163]: Invalid user ryu from 61.95.233.61 port 40422
May 28 00:24:13 vps sshd[146163]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61
May 28 00:24:15 vps sshd[146163]: Failed password for invalid user ryu from 61.95.233.61 port 40422 ssh2
May 28 00:28:14 vps sshd[164818]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=61.95.233.61  user=root
May 28 00:28:16 vps sshd[164818]: Failed password for root from 61.95.233.61 port 46190 ssh2
...
2020-05-28 06:31:47
37.49.226.129 attack
k+ssh-bruteforce
2020-05-28 06:44:36
184.105.139.85 attack
Port Scan detected!
...
2020-05-28 06:25:34
73.15.91.251 attackspambots
sshd jail - ssh hack attempt
2020-05-28 06:37:36
210.16.187.206 attackspam
Invalid user megan from 210.16.187.206 port 53723
2020-05-28 06:19:38
223.197.151.55 attack
784. On May 27 2020 experienced a Brute Force SSH login attempt -> 2 unique times by 223.197.151.55.
2020-05-28 06:35:27
1.196.222.191 attack
[portscan] Port scan
2020-05-28 06:58:48

Recently Reported IPs

159.246.23.141 69.46.197.179 66.248.129.232 23.106.136.33
18.220.135.108 41.133.236.96 37.100.77.213 88.5.225.248
14.79.232.231 128.238.231.230 231.244.210.130 119.3.238.64
236.22.244.104 79.196.208.236 36.29.161.26 159.210.36.143
174.160.224.97 90.82.173.186 232.220.12.151 37.229.33.52