Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.254.182.49
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 32553
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.254.182.49.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025062901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Jun 30 07:06:47 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 49.182.254.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 49.182.254.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
124.152.118.194 attackspambots
2020-08-28T15:58:28.216946vps-d63064a2 sshd[141898]: User root from 124.152.118.194 not allowed because not listed in AllowUsers
2020-08-28T15:58:30.377189vps-d63064a2 sshd[141898]: Failed password for invalid user root from 124.152.118.194 port 4199 ssh2
2020-08-28T16:02:47.844882vps-d63064a2 sshd[141953]: Invalid user bitbucket from 124.152.118.194 port 4200
2020-08-28T16:02:47.852643vps-d63064a2 sshd[141953]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=124.152.118.194
2020-08-28T16:02:47.844882vps-d63064a2 sshd[141953]: Invalid user bitbucket from 124.152.118.194 port 4200
2020-08-28T16:02:49.546382vps-d63064a2 sshd[141953]: Failed password for invalid user bitbucket from 124.152.118.194 port 4200 ssh2
...
2020-08-29 02:41:41
45.142.120.166 attack
2020-08-28 20:17:39 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data
2020-08-28 20:23:37 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data \(set_id=maxime@no-server.de\)
2020-08-28 20:23:46 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data \(set_id=maxime@no-server.de\)
2020-08-28 20:23:48 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data \(set_id=maxime@no-server.de\)
2020-08-28 20:24:10 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data \(set_id=vgorder@no-server.de\)
2020-08-28 20:24:16 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentication data \(set_id=vgorder@no-server.de\)
2020-08-28 20:24:22 dovecot_login authenticator failed for \(User\) \[45.142.120.166\]: 535 Incorrect authentic
...
2020-08-29 02:39:42
162.144.62.164 attack
2020-08-28 12:35:05.534219-0500  localhost smtpd[59978]: NOQUEUE: reject: RCPT from unknown[162.144.62.164]: 450 4.7.25 Client host rejected: cannot find your hostname, [162.144.62.164]; from= to= proto=ESMTP helo=<162-144-62-164.webhostbox.net>
2020-08-29 02:51:53
116.218.131.209 attack
Repeated brute force against a port
2020-08-29 03:08:16
203.176.74.228 attackspambots
Invalid user abhinav from 203.176.74.228 port 47206
2020-08-29 02:39:21
139.59.57.2 attackspam
2020-08-28T20:19:24+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-08-29 02:40:33
1.168.61.150 attackbotsspam
Port probing on unauthorized port 5555
2020-08-29 03:15:48
81.213.199.223 attackbotsspam
Unauthorized connection attempt from IP address 81.213.199.223 on Port 445(SMB)
2020-08-29 03:04:55
185.101.139.90 attackspam
G-Core Labs SCAM !  FRAUD FAKE mails ! 

Aug 28 13:32:49 server postfix/smtpd[22307]: warning: hostname contact1.example.com does not resolve to address 185.101.139.90: Name or service not known
Aug 28 13:32:49 server postfix/smtpd[22307]: connect from unknown[185.101.139.90]
Aug 28 13:32:49 server postfix/smtpd[22307]: warning: 90.139.101.185.zen.spamhaus.org: RBL lookup error: Host or domain name not found. Name service error for name=90.139.101.185.zen.spamhaus.org type=A: Host not found, try again
Aug 28 13:32:49 server postfix/smtpd[22307]: NOQUEUE: milter-reject: RCPT from unknown[185.101.139.90]: 550 5.7.0 You have been blacklisted.    from= to= proto=ESMTP helo=
Aug 28 13:32:49 server postfix/smtpd[22307]: disconnect from unknown[185.101.139.90] ehlo=1 mail=1 rcpt=0/1 quit=1 commands=3/4
2020-08-29 02:45:47
111.68.46.68 attack
Aug 28 21:32:41 hosting sshd[14260]: Invalid user andrei from 111.68.46.68 port 43656
...
2020-08-29 02:48:05
191.250.32.158 attackspambots
Unauthorized connection attempt from IP address 191.250.32.158 on Port 445(SMB)
2020-08-29 03:00:00
200.37.35.178 attackspambots
Aug 28 17:58:02 ns382633 sshd\[30087\]: Invalid user postgres from 200.37.35.178 port 49078
Aug 28 17:58:02 ns382633 sshd\[30087\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.37.35.178
Aug 28 17:58:03 ns382633 sshd\[30087\]: Failed password for invalid user postgres from 200.37.35.178 port 49078 ssh2
Aug 28 18:17:43 ns382633 sshd\[1151\]: Invalid user mic from 200.37.35.178 port 45948
Aug 28 18:17:43 ns382633 sshd\[1151\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.37.35.178
2020-08-29 02:55:26
49.146.47.40 attack
Unauthorized connection attempt from IP address 49.146.47.40 on Port 445(SMB)
2020-08-29 02:58:31
54.36.165.34 attackbotsspam
Aug 28 20:41:17 melroy-server sshd[20907]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.36.165.34 
Aug 28 20:41:18 melroy-server sshd[20907]: Failed password for invalid user es from 54.36.165.34 port 60748 ssh2
...
2020-08-29 02:41:29
41.35.241.132 attackspambots
Unauthorized connection attempt from IP address 41.35.241.132 on Port 445(SMB)
2020-08-29 02:54:06

Recently Reported IPs

104.17.34.243 78.236.232.119 8.175.147.248 108.234.212.23
74.253.92.144 36.46.72.246 22.127.234.174 174.179.60.103
19.245.228.26 166.136.29.238 76.44.2.228 55.12.25.152
133.239.113.179 150.184.179.5 129.159.253.95 130.63.224.225
163.69.248.249 110.11.5.12 44.235.99.104 222.133.236.38