Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Wilkinsburg

Region: Pennsylvania

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.22.11.234
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55980
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;48.22.11.234.			IN	A

;; AUTHORITY SECTION:
.			560	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020040101 1800 900 604800 86400

;; Query time: 871 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Apr 02 01:42:22 CST 2020
;; MSG SIZE  rcvd: 116
Host info
Host 234.11.22.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 234.11.22.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
171.240.76.112 attackspambots
Icarus honeypot on github
2020-05-30 19:48:54
159.65.183.47 attack
May 30 05:43:56 PorscheCustomer sshd[10976]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.183.47
May 30 05:43:58 PorscheCustomer sshd[10976]: Failed password for invalid user nagios from 159.65.183.47 port 58090 ssh2
May 30 05:44:42 PorscheCustomer sshd[10995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.183.47
...
2020-05-30 19:56:40
36.89.156.141 attack
2020-05-30T06:43:45.049647abusebot.cloudsearch.cf sshd[27035]: Invalid user user from 36.89.156.141 port 52530
2020-05-30T06:43:45.054726abusebot.cloudsearch.cf sshd[27035]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.156.141
2020-05-30T06:43:45.049647abusebot.cloudsearch.cf sshd[27035]: Invalid user user from 36.89.156.141 port 52530
2020-05-30T06:43:47.313410abusebot.cloudsearch.cf sshd[27035]: Failed password for invalid user user from 36.89.156.141 port 52530 ssh2
2020-05-30T06:48:13.394599abusebot.cloudsearch.cf sshd[27363]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.89.156.141  user=root
2020-05-30T06:48:15.778677abusebot.cloudsearch.cf sshd[27363]: Failed password for root from 36.89.156.141 port 57658 ssh2
2020-05-30T06:52:44.727544abusebot.cloudsearch.cf sshd[27634]: Invalid user test2 from 36.89.156.141 port 34550
...
2020-05-30 19:21:45
220.134.12.44 attackbotsspam
port 23
2020-05-30 19:23:41
218.93.225.150 attackbotsspam
reported through recidive - multiple failed attempts(SSH)
2020-05-30 19:48:25
179.108.83.250 attackbots
Unauthorized connection attempt from IP address 179.108.83.250 on Port 445(SMB)
2020-05-30 19:25:41
197.214.12.4 attack
Port probing on unauthorized port 445
2020-05-30 19:30:06
178.32.47.218 attack
Attempts to probe for or exploit a Drupal site on url: /user/register. Reported by the module https://www.drupal.org/project/abuseipdb.
2020-05-30 19:51:54
106.111.132.104 attack
Unauthorized connection attempt detected from IP address 106.111.132.104 to port 2323
2020-05-30 19:22:30
195.206.105.217 attackbots
Brute Force Joomla Admin Login
2020-05-30 19:38:50
106.52.57.120 attackbots
SSH Brute-Forcing (server2)
2020-05-30 19:34:29
219.85.191.152 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-05-30 19:26:25
203.156.205.59 attackspam
$f2bV_matches
2020-05-30 19:55:37
211.205.95.1 attack
Unauthorized connection attempt from IP address 211.205.95.1 on Port 445(SMB)
2020-05-30 19:33:46
197.211.198.162 attackspambots
May 30 12:09:03 l03 sshd[6558]: Invalid user wilch from 197.211.198.162 port 43918
...
2020-05-30 19:41:32

Recently Reported IPs

118.119.229.186 94.154.191.207 192.71.12.140 106.133.123.186
228.101.150.238 214.199.75.225 109.167.18.126 85.64.95.247
103.44.137.156 113.160.215.151 254.202.60.163 103.175.163.136
119.119.217.173 87.168.235.240 124.135.208.242 114.100.176.129
113.161.49.100 22.203.5.182 64.71.79.132 95.156.54.39