Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Shaw

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.55.70.53
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 12405
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;48.55.70.53.			IN	A

;; AUTHORITY SECTION:
.			526	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019100500 1800 900 604800 86400

;; Query time: 476 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Oct 05 16:16:10 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 53.70.55.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 53.70.55.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
117.55.241.2 attackbotsspam
Dec  4 21:26:57 * sshd[22345]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.55.241.2
Dec  4 21:26:59 * sshd[22345]: Failed password for invalid user helmers from 117.55.241.2 port 60646 ssh2
2019-12-05 05:22:46
106.13.198.70 attackbotsspam
Automatic report - Port Scan
2019-12-05 05:31:25
106.13.173.141 attack
Unauthorized SSH login attempts
2019-12-05 05:31:58
159.89.134.199 attackspam
Dec  4 22:29:37 legacy sshd[11147]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.199
Dec  4 22:29:39 legacy sshd[11147]: Failed password for invalid user lisa from 159.89.134.199 port 58554 ssh2
Dec  4 22:35:01 legacy sshd[11411]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.134.199
...
2019-12-05 05:37:17
5.135.165.51 attackbots
$f2bV_matches
2019-12-05 05:11:25
113.109.49.107 attackbots
Brute force attempt
2019-12-05 05:30:56
172.69.63.48 attackspam
Automated report (2019-12-04T19:26:22+00:00). Scraper detected at this address.
2019-12-05 05:25:29
196.15.211.91 attackbotsspam
Dec  4 21:09:34 game-panel sshd[6042]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.15.211.91
Dec  4 21:09:36 game-panel sshd[6042]: Failed password for invalid user Outdoor@2017 from 196.15.211.91 port 47870 ssh2
Dec  4 21:16:50 game-panel sshd[6352]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.15.211.91
2019-12-05 05:33:55
163.172.207.104 attackbots
\[2019-12-04 16:18:29\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-04T16:18:29.498-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="6011972592277524",SessionID="0x7f26c445f668",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/51752",ACLName="no_extension_match"
\[2019-12-04 16:21:32\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-04T16:21:32.818-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="5011972592277524",SessionID="0x7f26c400a0e8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/61880",ACLName="no_extension_match"
\[2019-12-04 16:24:59\] SECURITY\[2765\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-12-04T16:24:59.842-0500",Severity="Error",Service="SIP",EventVersion="1",AccountID="4011972592277524",SessionID="0x7f26c66638b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/163.172.207.104/56666",ACLNam
2019-12-05 05:46:45
222.186.175.167 attack
Dec  4 17:27:33 sshd: Connection from 222.186.175.167 port 26346
Dec  4 17:27:34 sshd: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.167  user=root
Dec  4 17:27:36 sshd: Failed password for root from 222.186.175.167 port 26346 ssh2
Dec  4 17:27:37 sshd: Received disconnect from 222.186.175.167: 11:  [preauth]
2019-12-05 05:10:25
142.93.202.93 attackbotsspam
Dec  4 21:48:18 legacy sshd[8860]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.202.93
Dec  4 21:48:20 legacy sshd[8860]: Failed password for invalid user kapp from 142.93.202.93 port 36310 ssh2
Dec  4 21:54:23 legacy sshd[9119]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.202.93
...
2019-12-05 05:17:20
112.85.42.178 attackspam
Triggered by Fail2Ban at Vostok web server
2019-12-05 05:33:04
180.76.249.74 attackspam
Dec  4 21:28:09 v22018086721571380 sshd[12484]: Failed password for invalid user gurinder from 180.76.249.74 port 41652 ssh2
Dec  4 21:34:16 v22018086721571380 sshd[12887]: Failed password for invalid user stoner from 180.76.249.74 port 42432 ssh2
2019-12-05 05:20:15
211.254.213.18 attackspambots
Dec  4 22:05:15 vps666546 sshd\[29247\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.213.18  user=backup
Dec  4 22:05:17 vps666546 sshd\[29247\]: Failed password for backup from 211.254.213.18 port 40848 ssh2
Dec  4 22:11:43 vps666546 sshd\[29569\]: Invalid user respaldo_linux from 211.254.213.18 port 50270
Dec  4 22:11:43 vps666546 sshd\[29569\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=211.254.213.18
Dec  4 22:11:45 vps666546 sshd\[29569\]: Failed password for invalid user respaldo_linux from 211.254.213.18 port 50270 ssh2
...
2019-12-05 05:15:09
185.143.223.184 attackspambots
Port scan on 11 port(s): 14058 14103 14112 14262 14286 14318 14406 14505 14893 14923 14996
2019-12-05 05:29:11

Recently Reported IPs

200.187.173.114 2.179.36.115 209.252.22.35 32.43.108.213
76.192.77.91 45.136.109.83 166.189.193.158 180.167.253.199
121.197.227.14 90.185.160.106 36.80.106.251 133.103.253.80
198.15.84.159 72.59.20.155 134.209.56.60 27.50.168.25
172.62.183.79 1.58.113.175 185.141.25.186 207.78.138.21