Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.3.70.203
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12331
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.3.70.203.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 04 17:19:02 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 203.70.3.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 203.70.3.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.244.234.8 attackbotsspam
Excessive Port-Scanning
2020-05-14 22:19:33
191.232.174.253 attackbots
May 14 15:39:38 vps647732 sshd[9787]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=191.232.174.253
May 14 15:39:40 vps647732 sshd[9787]: Failed password for invalid user master from 191.232.174.253 port 49258 ssh2
...
2020-05-14 22:06:11
84.38.183.50 attack
web-1 [ssh_2] SSH Attack
2020-05-14 22:20:57
180.120.213.103 attack
Brute Force - Postfix
2020-05-14 22:16:29
167.99.194.54 attack
[ssh] SSH attack
2020-05-14 22:02:06
198.108.67.50 attack
trying to access non-authorized port
2020-05-14 22:39:22
83.149.45.104 attackbots
nft/Honeypot/139/73e86
2020-05-14 22:40:48
159.65.189.115 attackbots
(sshd) Failed SSH login from 159.65.189.115 (US/United States/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: May 14 14:07:51 elude sshd[3117]: Invalid user www2 from 159.65.189.115 port 54986
May 14 14:07:52 elude sshd[3117]: Failed password for invalid user www2 from 159.65.189.115 port 54986 ssh2
May 14 14:22:18 elude sshd[5454]: Invalid user windows from 159.65.189.115 port 53394
May 14 14:22:20 elude sshd[5454]: Failed password for invalid user windows from 159.65.189.115 port 53394 ssh2
May 14 14:27:05 elude sshd[6218]: Invalid user wps from 159.65.189.115 port 33800
2020-05-14 22:22:39
150.109.147.145 attackspambots
May 14 15:21:31 lukav-desktop sshd\[30786\]: Invalid user felix from 150.109.147.145
May 14 15:21:31 lukav-desktop sshd\[30786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.147.145
May 14 15:21:32 lukav-desktop sshd\[30786\]: Failed password for invalid user felix from 150.109.147.145 port 56520 ssh2
May 14 15:27:16 lukav-desktop sshd\[30898\]: Invalid user test from 150.109.147.145
May 14 15:27:16 lukav-desktop sshd\[30898\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=150.109.147.145
2020-05-14 22:10:59
106.54.223.22 attackbots
May 12 07:42:07 server6 sshd[25787]: Failed password for invalid user ubuntu from 106.54.223.22 port 41054 ssh2
May 12 07:42:07 server6 sshd[25787]: Received disconnect from 106.54.223.22: 11: Bye Bye [preauth]
May 12 07:45:29 server6 sshd[29251]: Failed password for invalid user des from 106.54.223.22 port 46088 ssh2
May 12 07:45:29 server6 sshd[29251]: Received disconnect from 106.54.223.22: 11: Bye Bye [preauth]
May 12 07:48:33 server6 sshd[31422]: Failed password for invalid user ubuntu from 106.54.223.22 port 49172 ssh2
May 12 07:48:34 server6 sshd[31422]: Received disconnect from 106.54.223.22: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.54.223.22
2020-05-14 22:45:02
49.232.135.14 attackbots
May 14 14:22:02 v22018086721571380 sshd[18074]: Failed password for invalid user ts2 from 49.232.135.14 port 39786 ssh2
2020-05-14 22:38:30
122.51.238.211 attackspam
May 14 18:20:53 gw1 sshd[22571]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=122.51.238.211
May 14 18:20:55 gw1 sshd[22571]: Failed password for invalid user rax from 122.51.238.211 port 57178 ssh2
...
2020-05-14 22:43:01
220.176.204.91 attackbotsspam
May 14 15:13:06 srv-ubuntu-dev3 sshd[40968]: Invalid user postgres from 220.176.204.91
May 14 15:13:06 srv-ubuntu-dev3 sshd[40968]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.204.91
May 14 15:13:06 srv-ubuntu-dev3 sshd[40968]: Invalid user postgres from 220.176.204.91
May 14 15:13:08 srv-ubuntu-dev3 sshd[40968]: Failed password for invalid user postgres from 220.176.204.91 port 39513 ssh2
May 14 15:18:14 srv-ubuntu-dev3 sshd[41947]: Invalid user nano from 220.176.204.91
May 14 15:18:14 srv-ubuntu-dev3 sshd[41947]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=220.176.204.91
May 14 15:18:14 srv-ubuntu-dev3 sshd[41947]: Invalid user nano from 220.176.204.91
May 14 15:18:15 srv-ubuntu-dev3 sshd[41947]: Failed password for invalid user nano from 220.176.204.91 port 3609 ssh2
May 14 15:22:57 srv-ubuntu-dev3 sshd[42620]: Invalid user bftp from 220.176.204.91
...
2020-05-14 22:44:18
196.218.177.135 attack
20/5/14@08:27:18: FAIL: Alarm-Intrusion address from=196.218.177.135
...
2020-05-14 22:14:17
218.92.0.184 attackbots
Brute force attempt
2020-05-14 22:14:48

Recently Reported IPs

33.52.164.247 116.201.214.141 65.66.251.103 166.158.210.205
20.122.217.74 160.198.249.18 22.69.245.199 247.183.144.30
99.234.70.106 34.61.28.174 81.215.42.12 78.95.146.11
86.5.191.46 192.87.148.53 202.208.170.120 166.211.198.144
69.190.253.150 77.68.143.114 72.158.76.16 66.220.136.91