Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.42.61.163
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 8088
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.42.61.163.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021500 1800 900 604800 86400

;; Query time: 38 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 15 19:09:17 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 163.61.42.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 163.61.42.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
168.194.13.24 attack
Brute-force attempt banned
2020-06-04 16:34:02
71.189.47.10 attack
(sshd) Failed SSH login from 71.189.47.10 (US/United States/mail.ehmsllc.com): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Jun  4 08:17:36 ubnt-55d23 sshd[4431]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=71.189.47.10  user=root
Jun  4 08:17:38 ubnt-55d23 sshd[4431]: Failed password for root from 71.189.47.10 port 21867 ssh2
2020-06-04 16:31:15
64.227.126.134 attackbotsspam
2020-06-04T01:40:22.819045morrigan.ad5gb.com sshd[5310]: Disconnected from authenticating user root 64.227.126.134 port 40084 [preauth]
2020-06-04T01:43:42.867206morrigan.ad5gb.com sshd[5392]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=64.227.126.134  user=root
2020-06-04T01:43:44.791559morrigan.ad5gb.com sshd[5392]: Failed password for root from 64.227.126.134 port 38082 ssh2
2020-06-04 16:35:51
51.38.80.173 attackbotsspam
$f2bV_matches
2020-06-04 16:16:21
36.107.231.56 attack
Jun  4 10:44:46 itv-usvr-02 sshd[1535]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.107.231.56  user=root
Jun  4 10:48:24 itv-usvr-02 sshd[1660]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.107.231.56  user=root
Jun  4 10:52:04 itv-usvr-02 sshd[1745]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.107.231.56  user=root
2020-06-04 16:29:46
195.54.160.7 attack
Hacking
2020-06-04 15:54:27
205.185.117.149 attackspam
prod6
...
2020-06-04 16:23:09
188.166.158.153 attackspambots
188.166.158.153 - - [04/Jun/2020:08:51:38 +0100] "POST /wp-login.php HTTP/1.1" 200 1875 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
188.166.158.153 - - [04/Jun/2020:08:51:44 +0100] "POST /wp-login.php HTTP/1.1" 200 1860 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
188.166.158.153 - - [04/Jun/2020:08:51:49 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-06-04 16:10:28
54.38.177.68 attack
54.38.177.68 has been banned for [WebApp Attack]
...
2020-06-04 16:01:18
116.106.229.90 attackspam
trying to access non-authorized port
2020-06-04 16:34:50
156.96.114.195 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-06-04 16:03:18
177.154.236.29 attackspam
(smtpauth) Failed SMTP AUTH login from 177.154.236.29 (BR/Brazil/-): 1 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_TRIGGER; Logs: 2020-06-04 08:23:10 plain authenticator failed for ([177.154.236.29]) [177.154.236.29]: 535 Incorrect authentication data (set_id=training)
2020-06-04 15:56:30
106.53.2.215 attack
5x Failed Password
2020-06-04 16:12:54
49.233.46.219 attack
2020-06-04T05:52:50.124734+02:00  sshd[3130]: Failed password for root from 49.233.46.219 port 44250 ssh2
2020-06-04 16:04:03
212.129.38.177 attack
2020-06-04T05:46:30.341650sd-86998 sshd[29298]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.38.177  user=root
2020-06-04T05:46:32.011078sd-86998 sshd[29298]: Failed password for root from 212.129.38.177 port 39660 ssh2
2020-06-04T05:49:52.554940sd-86998 sshd[30339]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.38.177  user=root
2020-06-04T05:49:55.286937sd-86998 sshd[30339]: Failed password for root from 212.129.38.177 port 42578 ssh2
2020-06-04T05:53:05.622151sd-86998 sshd[31338]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=212.129.38.177  user=root
2020-06-04T05:53:07.853585sd-86998 sshd[31338]: Failed password for root from 212.129.38.177 port 45492 ssh2
...
2020-06-04 15:57:58

Recently Reported IPs

175.147.202.64 135.155.199.203 174.3.83.81 208.82.255.126
227.159.205.1 74.79.200.222 86.90.144.159 50.29.235.167
109.44.134.44 97.76.238.120 115.161.206.28 35.236.17.99
150.112.186.180 223.168.166.49 244.209.147.219 95.74.143.191
2.213.170.169 35.141.239.139 9.105.219.84 81.24.14.169