Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.40.141.222
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 37582
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.40.141.222.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020602 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 07 13:33:36 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 222.141.40.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 222.141.40.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
37.49.227.109 attackbots
37.49.227.109 was recorded 6 times by 6 hosts attempting to connect to the following ports: 41794. Incident counter (4h, 24h, all-time): 6, 44, 2976
2020-04-02 04:27:46
49.234.44.48 attack
Apr  1 22:38:27 ewelt sshd[3283]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.234.44.48
Apr  1 22:38:27 ewelt sshd[3283]: Invalid user ze from 49.234.44.48 port 48659
Apr  1 22:38:30 ewelt sshd[3283]: Failed password for invalid user ze from 49.234.44.48 port 48659 ssh2
Apr  1 22:43:24 ewelt sshd[3651]: Invalid user alarm from 49.234.44.48 port 50565
...
2020-04-02 04:47:06
65.182.2.241 attackbots
Invalid user sin from 65.182.2.241 port 56760
2020-04-02 04:33:44
176.31.182.79 attackbotsspam
Apr  1 22:00:04  sshd\[20969\]: User root from ns3326271.ip-176-31-182.eu not allowed because not listed in AllowUsersApr  1 22:00:06  sshd\[20969\]: Failed password for invalid user root from 176.31.182.79 port 56566 ssh2
...
2020-04-02 04:45:24
82.247.200.185 attack
SSH-bruteforce attempts
2020-04-02 04:52:04
27.102.66.213 attackspambots
(sshd) Failed SSH login from 27.102.66.213 (KR/South Korea/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  1 19:00:55 ubnt-55d23 sshd[2736]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.102.66.213  user=root
Apr  1 19:00:58 ubnt-55d23 sshd[2736]: Failed password for root from 27.102.66.213 port 56686 ssh2
2020-04-02 04:18:24
92.63.194.32 attackbotsspam
2020-04-01T20:16:43.334583shield sshd\[20241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.32  user=root
2020-04-01T20:16:45.935642shield sshd\[20241\]: Failed password for root from 92.63.194.32 port 39385 ssh2
2020-04-01T20:17:41.247243shield sshd\[20450\]: Invalid user admin from 92.63.194.32 port 35721
2020-04-01T20:17:41.250718shield sshd\[20450\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.32
2020-04-01T20:17:43.480505shield sshd\[20450\]: Failed password for invalid user admin from 92.63.194.32 port 35721 ssh2
2020-04-02 04:37:21
123.16.204.109 attackspambots
SMB Server BruteForce Attack
2020-04-02 04:23:03
106.13.102.141 attack
Apr  2 02:56:16 webhost01 sshd[29541]: Failed password for root from 106.13.102.141 port 39966 ssh2
...
2020-04-02 04:42:39
123.206.216.65 attackbots
Apr  1 15:54:44 main sshd[32651]: Failed password for invalid user liyan from 123.206.216.65 port 43264 ssh2
Apr  1 16:07:05 main sshd[364]: Failed password for invalid user yyx from 123.206.216.65 port 42986 ssh2
Apr  1 16:42:54 main sshd[962]: Failed password for invalid user dby from 123.206.216.65 port 42328 ssh2
Apr  1 16:52:39 main sshd[1071]: Failed password for invalid user test from 123.206.216.65 port 42232 ssh2
Apr  1 17:39:00 main sshd[1625]: Failed password for invalid user dh from 123.206.216.65 port 41520 ssh2
2020-04-02 04:24:13
45.133.99.16 attack
Apr  1 22:16:45 mail.srvfarm.net postfix/smtpd[1436604]: warning: unknown[45.133.99.16]: SASL PLAIN authentication failed: 
Apr  1 22:16:45 mail.srvfarm.net postfix/smtpd[1436604]: lost connection after AUTH from unknown[45.133.99.16]
Apr  1 22:16:50 mail.srvfarm.net postfix/smtpd[1438782]: lost connection after AUTH from unknown[45.133.99.16]
Apr  1 22:16:54 mail.srvfarm.net postfix/smtpd[1436942]: lost connection after AUTH from unknown[45.133.99.16]
Apr  1 22:16:57 mail.srvfarm.net postfix/smtpd[1438781]: lost connection after AUTH from unknown[45.133.99.16]
2020-04-02 04:28:43
187.157.135.152 attack
3x Failed Password
2020-04-02 04:56:19
192.241.235.197 attackspambots
Port probing on unauthorized port 2095
2020-04-02 04:22:39
176.109.191.228 attackbotsspam
" "
2020-04-02 04:40:51
178.62.60.233 attackbotsspam
Invalid user wusifan from 178.62.60.233 port 41572
2020-04-02 04:40:35

Recently Reported IPs

133.25.56.79 41.212.104.190 83.141.218.252 115.87.25.206
237.129.202.178 207.118.26.174 177.207.12.4 147.206.12.239
72.175.211.76 175.149.172.226 133.135.168.51 158.171.143.69
135.55.193.250 4.155.116.241 129.117.239.119 63.222.153.142
4.42.102.70 44.89.199.209 91.170.249.170 207.205.99.179