Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.222.105.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62537
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.222.105.13.			IN	A

;; AUTHORITY SECTION:
.			57	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022013001 1800 900 604800 86400

;; Query time: 86 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jan 31 11:18:48 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 13.105.222.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 13.105.222.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
93.158.161.26 attackbotsspam
IP: 93.158.161.26
ASN: AS13238 YANDEX LLC
Port: World Wide Web HTTP 80
Date: 2/07/2019 3:44:55 AM UTC
2019-07-02 19:51:15
36.62.113.181 attackspambots
23/tcp
[2019-07-02]1pkt
2019-07-02 19:40:06
141.98.10.42 attackbots
Rude login attack (9 tries in 1d)
2019-07-02 19:23:08
165.22.84.56 attack
$f2bV_matches
2019-07-02 19:52:54
180.126.239.102 attackbotsspam
TCP port 22 (SSH) attempt blocked by firewall. [2019-07-02 12:12:35]
2019-07-02 19:20:34
177.36.43.13 attackbots
$f2bV_matches
2019-07-02 19:54:54
78.188.153.251 attackbotsspam
23/tcp
[2019-07-02]1pkt
2019-07-02 19:43:07
175.100.24.138 attackspambots
$f2bV_matches
2019-07-02 19:55:14
183.157.180.31 attackspambots
2019-07-02T11:33:32.791146enmeeting.mahidol.ac.th sshd\[3626\]: User root from 183.157.180.31 not allowed because not listed in AllowUsers
2019-07-02T11:33:32.913366enmeeting.mahidol.ac.th sshd\[3626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=183.157.180.31  user=root
2019-07-02T11:33:34.924431enmeeting.mahidol.ac.th sshd\[3626\]: Failed password for invalid user root from 183.157.180.31 port 4400 ssh2
...
2019-07-02 19:49:39
41.65.224.98 attack
SSH Brute Force
2019-07-02 19:27:54
106.12.78.102 attackbotsspam
Brute force attempt
2019-07-02 19:32:49
34.77.171.195 attack
22/tcp
[2019-07-02]1pkt
2019-07-02 19:24:47
92.42.111.78 attackspambots
SIP Server BruteForce Attack
2019-07-02 19:58:12
2.32.107.178 attack
SSH Bruteforce
2019-07-02 19:37:49
171.229.207.107 attackbotsspam
TCP port 445 (SMB) attempt blocked by firewall. [2019-07-02 05:45:26]
2019-07-02 19:13:47

Recently Reported IPs

161.188.115.122 227.158.43.215 193.213.36.64 225.5.69.136
103.194.171.107 162.10.87.227 124.237.218.198 153.145.210.136
199.190.31.189 251.250.149.148 109.118.110.90 136.224.48.24
96.234.158.26 94.254.208.63 241.8.131.222 1.103.252.182
150.207.215.65 247.53.112.102 191.159.63.154 64.177.2.125