City: unknown
Region: unknown
Country: United States
Internet Service Provider: unknown
Hostname: unknown
Organization: unknown
Usage Type: unknown
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
NetRange: 48.0.0.0 - 48.43.255.255
CIDR: 48.32.0.0/13, 48.40.0.0/14, 48.0.0.0/11
NetName: PRU48
NetHandle: NET-48-0-0-0-1
Parent: NET48 (NET-48-0-0-0-0)
NetType: Direct Allocation
OriginAS:
Organization: The Prudential Insurance Company of America (PICA-3-Z)
RegDate: 1990-12-07
Updated: 2025-12-10
Ref: https://rdap.arin.net/registry/ip/48.0.0.0
OrgName: The Prudential Insurance Company of America
OrgId: PICA-3-Z
Address: 751 Broad Street
City: Newark
StateProv: NJ
PostalCode: 07102-3777
Country: US
RegDate: 2008-02-29
Updated: 2008-05-23
Ref: https://rdap.arin.net/registry/entity/PICA-3-Z
OrgTechHandle: NETWO2262-ARIN
OrgTechName: Network Administrator
OrgTechPhone: +1-973-716-5051
OrgTechEmail: net48admin@prudential.com
OrgTechRef: https://rdap.arin.net/registry/entity/NETWO2262-ARIN
OrgAbuseHandle: NETWO2262-ARIN
OrgAbuseName: Network Administrator
OrgAbusePhone: +1-973-716-5051
OrgAbuseEmail: net48admin@prudential.com
OrgAbuseRef: https://rdap.arin.net/registry/entity/NETWO2262-ARIN
OrgNOCHandle: NETWO2262-ARIN
OrgNOCName: Network Administrator
OrgNOCPhone: +1-973-716-5051
OrgNOCEmail: net48admin@prudential.com
OrgNOCRef: https://rdap.arin.net/registry/entity/NETWO2262-ARIN
#
# ARIN WHOIS data and services are subject to the Terms of Use
# available at: https://www.arin.net/resources/registry/whois/tou/
#
# If you see inaccuracies in the results, please report at
# https://www.arin.net/resources/registry/whois/inaccuracy_reporting/
#
# Copyright 1997-2026, American Registry for Internet Numbers, Ltd.
#
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.31.92.98
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35601
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0
;; QUESTION SECTION:
;48.31.92.98. IN A
;; AUTHORITY SECTION:
. 30 IN SOA a.root-servers.net. nstld.verisign-grs.com. 2026033002 1800 900 604800 86400
;; Query time: 28 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Mar 31 06:59:46 CST 2026
;; MSG SIZE rcvd: 104
Host 98.92.31.48.in-addr.arpa. not found: 3(NXDOMAIN)
Server: 183.60.83.19
Address: 183.60.83.19#53
** server can't find 98.92.31.48.in-addr.arpa: NXDOMAIN
| IP | Type | Details | Datetime |
|---|---|---|---|
| 129.204.181.186 | attackbots | Unauthorized access or intrusion attempt detected from Thor banned IP |
2020-04-21 18:45:33 |
| 106.13.178.27 | attackspam | Apr 21 10:54:45 163-172-32-151 sshd[12030]: Invalid user nw from 106.13.178.27 port 50626 ... |
2020-04-21 18:59:35 |
| 86.109.216.230 | attackspambots | $f2bV_matches |
2020-04-21 19:00:24 |
| 168.227.99.10 | attack | [ssh] SSH attack |
2020-04-21 18:40:13 |
| 51.89.68.142 | attack | Apr 21 09:24:46 l03 sshd[31334]: Invalid user hz from 51.89.68.142 port 37758 ... |
2020-04-21 18:54:12 |
| 27.128.161.234 | attackbotsspam | Unauthorized connection attempt detected from IP address 27.128.161.234 to port 1684 [T] |
2020-04-21 19:11:02 |
| 111.229.103.67 | attackspam | Apr 21 02:45:23 vps46666688 sshd[10166]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.103.67 Apr 21 02:45:24 vps46666688 sshd[10166]: Failed password for invalid user ck from 111.229.103.67 port 41324 ssh2 ... |
2020-04-21 18:52:15 |
| 192.210.192.165 | attackspam | Apr 21 12:04:59 host sshd[21964]: Invalid user au from 192.210.192.165 port 49438 ... |
2020-04-21 18:47:16 |
| 223.100.167.105 | attack | Apr 21 11:17:15 mail sshd\[10689\]: Invalid user nc from 223.100.167.105 Apr 21 11:17:15 mail sshd\[10689\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=223.100.167.105 Apr 21 11:17:18 mail sshd\[10689\]: Failed password for invalid user nc from 223.100.167.105 port 55697 ssh2 ... |
2020-04-21 19:06:23 |
| 103.236.151.151 | attackbotsspam | DDdos to my Serrver in Vietnam |
2020-04-21 19:06:04 |
| 94.69.60.159 | attack | Port probing on unauthorized port 8080 |
2020-04-21 18:46:21 |
| 195.38.126.113 | attack | Invalid user iw from 195.38.126.113 port 5375 |
2020-04-21 19:07:40 |
| 144.208.126.166 | attackspambots | Apr 21 11:48:24 debian-2gb-nbg1-2 kernel: \[9721463.392897\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=144.208.126.166 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=243 ID=61976 PROTO=TCP SPT=58038 DPT=2018 WINDOW=1024 RES=0x00 SYN URGP=0 |
2020-04-21 18:51:52 |
| 119.29.216.238 | attackspambots | 2020-04-20 UTC: (2x) - |
2020-04-21 18:35:07 |
| 109.160.91.54 | attackbotsspam | email spam |
2020-04-21 19:09:15 |