Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.49.237.66
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 35758
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.49.237.66.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Feb 11 23:14:40 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 66.237.49.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 66.237.49.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
49.232.144.7 attackbots
Failed password for root from 49.232.144.7 port 40868 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.144.7  user=root
Failed password for root from 49.232.144.7 port 56186 ssh2
pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.232.144.7  user=root
Failed password for root from 49.232.144.7 port 43270 ssh2
2020-06-03 20:23:27
71.6.233.144 attackspambots
Port Scan detected!
...
2020-06-03 20:39:15
188.165.236.122 attackspambots
Jun  3 02:24:26 web9 sshd\[30279\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.236.122  user=root
Jun  3 02:24:27 web9 sshd\[30279\]: Failed password for root from 188.165.236.122 port 51844 ssh2
Jun  3 02:27:53 web9 sshd\[30786\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.236.122  user=root
Jun  3 02:27:55 web9 sshd\[30786\]: Failed password for root from 188.165.236.122 port 49799 ssh2
Jun  3 02:31:17 web9 sshd\[31870\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.165.236.122  user=root
2020-06-03 20:45:06
195.87.86.170 attackspambots
Unauthorised access (Jun  3) SRC=195.87.86.170 LEN=52 TTL=115 ID=32052 DF TCP DPT=445 WINDOW=8192 SYN
2020-06-03 20:43:34
134.175.191.248 attackbotsspam
2020-06-03T05:57:41.010245linuxbox-skyline sshd[108361]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.191.248  user=root
2020-06-03T05:57:43.183714linuxbox-skyline sshd[108361]: Failed password for root from 134.175.191.248 port 47760 ssh2
...
2020-06-03 20:13:24
82.100.239.100 attackbots
Brute forcing RDP port 3389
2020-06-03 20:38:47
163.44.159.154 attackspam
Jun  3 14:49:28 journals sshd\[5609\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.159.154  user=root
Jun  3 14:49:30 journals sshd\[5609\]: Failed password for root from 163.44.159.154 port 47744 ssh2
Jun  3 14:53:31 journals sshd\[33640\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.159.154  user=root
Jun  3 14:53:33 journals sshd\[33640\]: Failed password for root from 163.44.159.154 port 50806 ssh2
Jun  3 14:57:34 journals sshd\[34214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=163.44.159.154  user=root
...
2020-06-03 20:15:58
138.68.253.149 attack
Jun  3 13:53:58 [host] sshd[28912]: pam_unix(sshd:
Jun  3 13:54:00 [host] sshd[28912]: Failed passwor
Jun  3 13:57:27 [host] sshd[29085]: pam_unix(sshd:
2020-06-03 20:18:22
79.196.125.113 attackbotsspam
[H1.VM8] Blocked by UFW
2020-06-03 20:46:17
147.135.232.100 attackbots
2020-06-03T11:59:53.859762homeassistant sshd[27986]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=147.135.232.100  user=root
2020-06-03T11:59:55.959071homeassistant sshd[27986]: Failed password for root from 147.135.232.100 port 36856 ssh2
...
2020-06-03 20:22:45
185.10.129.64 attack
Automatic report - XMLRPC Attack
2020-06-03 20:44:39
182.61.108.64 attack
Jun  3 14:08:57 abendstille sshd\[6639\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.64  user=root
Jun  3 14:09:00 abendstille sshd\[6639\]: Failed password for root from 182.61.108.64 port 47920 ssh2
Jun  3 14:11:13 abendstille sshd\[8856\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.64  user=root
Jun  3 14:11:15 abendstille sshd\[8856\]: Failed password for root from 182.61.108.64 port 53280 ssh2
Jun  3 14:13:40 abendstille sshd\[11405\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.61.108.64  user=root
...
2020-06-03 20:20:28
195.54.166.184 attackbots
Port scan detected on ports: 34560[TCP], 34744[TCP], 34785[TCP]
2020-06-03 20:47:50
68.183.230.117 attackspam
Jun  3 02:09:37 web1 sshd\[22859\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.117  user=root
Jun  3 02:09:39 web1 sshd\[22859\]: Failed password for root from 68.183.230.117 port 48928 ssh2
Jun  3 02:13:46 web1 sshd\[23241\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.117  user=root
Jun  3 02:13:47 web1 sshd\[23241\]: Failed password for root from 68.183.230.117 port 54534 ssh2
Jun  3 02:17:41 web1 sshd\[23551\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.183.230.117  user=root
2020-06-03 20:18:10
222.186.175.167 attack
Jun  3 05:11:50 debian sshd[6808]: Unable to negotiate with 222.186.175.167 port 64742: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
Jun  3 08:40:06 debian sshd[28933]: Unable to negotiate with 222.186.175.167 port 33124: no matching key exchange method found. Their offer: diffie-hellman-group1-sha1,diffie-hellman-group14-sha1,diffie-hellman-group-exchange-sha1 [preauth]
...
2020-06-03 20:43:54

Recently Reported IPs

162.112.51.86 124.184.75.132 26.93.194.160 166.82.110.98
24.109.176.166 238.171.147.32 165.166.16.138 62.177.73.147
147.18.21.181 84.227.153.91 219.87.227.43 253.227.72.166
43.96.189.153 208.188.181.95 170.229.46.170 222.205.97.47
108.160.184.30 203.133.217.30 17.156.168.244 230.172.82.189