Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.219.148.221
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 981
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.219.148.221.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021300 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 18:19:05 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 221.148.219.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 221.148.219.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.202.180 attackspambots
Aug 19 12:50:23 icinga sshd[15455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.202.180
Aug 19 12:50:25 icinga sshd[15455]: Failed password for invalid user jinho from 106.12.202.180 port 14362 ssh2
...
2019-08-19 19:04:07
212.170.50.203 attackbots
2019-08-19T10:48:19.197620abusebot-8.cloudsearch.cf sshd\[11021\]: Invalid user hadoopuser from 212.170.50.203 port 39730
2019-08-19 19:12:46
45.6.72.14 attackbotsspam
Aug 19 12:52:34 mail sshd\[23319\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.14
Aug 19 12:52:35 mail sshd\[23319\]: Failed password for invalid user arma1 from 45.6.72.14 port 52688 ssh2
Aug 19 12:57:29 mail sshd\[24306\]: Invalid user iraf from 45.6.72.14 port 40370
Aug 19 12:57:29 mail sshd\[24306\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.6.72.14
Aug 19 12:57:31 mail sshd\[24306\]: Failed password for invalid user iraf from 45.6.72.14 port 40370 ssh2
2019-08-19 19:20:00
174.91.10.96 attackspambots
Aug 19 12:29:41 srv-4 sshd\[16916\]: Invalid user nadine from 174.91.10.96
Aug 19 12:29:41 srv-4 sshd\[16916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=174.91.10.96
Aug 19 12:29:43 srv-4 sshd\[16916\]: Failed password for invalid user nadine from 174.91.10.96 port 37330 ssh2
...
2019-08-19 19:36:36
211.24.79.26 attack
2019-08-19T09:56:10.088507abusebot-8.cloudsearch.cf sshd\[10672\]: Invalid user factorio from 211.24.79.26 port 38780
2019-08-19 19:14:09
104.140.188.30 attackbots
[portscan] tcp/1433 [MsSQL]
*(RWIN=1024)(08191236)
2019-08-19 18:54:36
61.153.49.210 attackspam
Jul 29 16:50:54 mercury auth[21744]: pam_unix(dovecot:auth): authentication failure; logname= uid=0 euid=0 tty=dovecot ruser=admin@lukegirvin.co.uk rhost=61.153.49.210
...
2019-08-19 18:59:15
51.38.231.36 attackbots
Aug 19 00:40:11 wbs sshd\[3124\]: Invalid user admin from 51.38.231.36
Aug 19 00:40:11 wbs sshd\[3124\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-38-231.eu
Aug 19 00:40:13 wbs sshd\[3124\]: Failed password for invalid user admin from 51.38.231.36 port 44784 ssh2
Aug 19 00:44:22 wbs sshd\[3498\]: Invalid user admin from 51.38.231.36
Aug 19 00:44:22 wbs sshd\[3498\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.ip-51-38-231.eu
2019-08-19 18:45:41
118.97.188.105 attackbots
Aug 19 13:20:47 srv-4 sshd\[22530\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.188.105  user=root
Aug 19 13:20:49 srv-4 sshd\[22530\]: Failed password for root from 118.97.188.105 port 46532 ssh2
Aug 19 13:26:04 srv-4 sshd\[23017\]: Invalid user diana from 118.97.188.105
Aug 19 13:26:04 srv-4 sshd\[23017\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.97.188.105
...
2019-08-19 18:48:26
77.253.129.4 attackspam
[portscan] Port scan
2019-08-19 18:57:45
101.124.70.145 attackspambots
Aug 19 10:55:35 www sshd\[62711\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.124.70.145  user=root
Aug 19 10:55:37 www sshd\[62711\]: Failed password for root from 101.124.70.145 port 48240 ssh2
Aug 19 10:58:15 www sshd\[62746\]: Invalid user mongodb from 101.124.70.145
...
2019-08-19 19:12:20
106.12.33.226 attack
Aug 19 10:42:35 www_kotimaassa_fi sshd[1324]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.33.226
Aug 19 10:42:37 www_kotimaassa_fi sshd[1324]: Failed password for invalid user anca from 106.12.33.226 port 54962 ssh2
...
2019-08-19 18:58:45
170.130.187.14 attackspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-08-19 19:28:58
104.206.128.38 attackspam
Honeypot attack, port: 23, PTR: 38-128.206.104.serverhubrdns.in-addr.arpa.
2019-08-19 19:11:46
198.108.66.64 attackspam
[httpReq only by ip - not DomainName]
[bad UserAgent]
2019-08-19 19:18:10

Recently Reported IPs

250.244.231.39 133.240.178.7 142.138.242.250 130.122.227.91
149.155.232.33 149.49.130.127 50.12.21.208 139.50.245.51
223.218.13.48 79.141.70.154 137.70.159.187 46.174.253.79
30.60.41.37 225.163.242.62 76.248.21.127 104.157.118.147
129.79.2.41 113.25.34.122 205.230.94.26 58.204.130.65