Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.7.98.3
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62924
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.7.98.3.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022801 1800 900 604800 86400

;; Query time: 214 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 01 04:57:15 CST 2025
;; MSG SIZE  rcvd: 102
Host info
Host 3.98.7.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 3.98.7.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
66.219.18.145 attackspambots
Automatic report - Banned IP Access
2020-06-10 22:16:54
41.39.225.78 attackbotsspam
Unauthorized connection attempt from IP address 41.39.225.78 on Port 445(SMB)
2020-06-10 22:27:34
113.162.10.202 attackbotsspam
Unauthorized connection attempt from IP address 113.162.10.202 on Port 445(SMB)
2020-06-10 22:18:48
185.175.93.23 attackbots
TCP ports : 6002 / 6008
2020-06-10 22:36:41
121.28.84.13 attackspam
ET SCAN Suspicious inbound to MSSQL port 1433 - port: 1433 proto: TCP cat: Potentially Bad Traffic
2020-06-10 23:02:06
115.72.26.201 attack
Unauthorized connection attempt from IP address 115.72.26.201 on Port 445(SMB)
2020-06-10 22:22:01
122.2.98.68 attackspam
Unauthorized connection attempt from IP address 122.2.98.68 on Port 445(SMB)
2020-06-10 22:28:49
222.186.173.226 attackspam
2020-06-10T16:25:00.406128struts4.enskede.local sshd\[7871\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.173.226  user=root
2020-06-10T16:25:03.290805struts4.enskede.local sshd\[7871\]: Failed password for root from 222.186.173.226 port 2268 ssh2
2020-06-10T16:25:07.814558struts4.enskede.local sshd\[7871\]: Failed password for root from 222.186.173.226 port 2268 ssh2
2020-06-10T16:25:11.860569struts4.enskede.local sshd\[7871\]: Failed password for root from 222.186.173.226 port 2268 ssh2
2020-06-10T16:25:15.733118struts4.enskede.local sshd\[7871\]: Failed password for root from 222.186.173.226 port 2268 ssh2
...
2020-06-10 22:35:46
132.232.19.28 attack
Jun 10 14:16:05 home sshd[29054]: Failed password for root from 132.232.19.28 port 47926 ssh2
Jun 10 14:17:42 home sshd[29217]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=132.232.19.28
Jun 10 14:17:44 home sshd[29217]: Failed password for invalid user stack@kvm-ovh from 132.232.19.28 port 36748 ssh2
...
2020-06-10 22:20:34
111.229.167.10 attack
2020-06-10T14:15:46.655444galaxy.wi.uni-potsdam.de sshd[1412]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.167.10  user=root
2020-06-10T14:15:48.754890galaxy.wi.uni-potsdam.de sshd[1412]: Failed password for root from 111.229.167.10 port 58840 ssh2
2020-06-10T14:16:15.459218galaxy.wi.uni-potsdam.de sshd[1509]: Invalid user na from 111.229.167.10 port 35242
2020-06-10T14:16:15.461258galaxy.wi.uni-potsdam.de sshd[1509]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.167.10
2020-06-10T14:16:15.459218galaxy.wi.uni-potsdam.de sshd[1509]: Invalid user na from 111.229.167.10 port 35242
2020-06-10T14:16:17.208181galaxy.wi.uni-potsdam.de sshd[1509]: Failed password for invalid user na from 111.229.167.10 port 35242 ssh2
2020-06-10T14:16:47.512965galaxy.wi.uni-potsdam.de sshd[1563]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.167.10  user=root
2
...
2020-06-10 22:38:23
107.180.120.45 attackbots
Automatic report - XMLRPC Attack
2020-06-10 22:42:47
222.186.31.83 attackspambots
Jun 10 16:48:10 MainVPS sshd[13731]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Jun 10 16:48:13 MainVPS sshd[13731]: Failed password for root from 222.186.31.83 port 56641 ssh2
Jun 10 16:48:21 MainVPS sshd[13788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Jun 10 16:48:23 MainVPS sshd[13788]: Failed password for root from 222.186.31.83 port 63253 ssh2
Jun 10 16:48:30 MainVPS sshd[13970]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.31.83  user=root
Jun 10 16:48:33 MainVPS sshd[13970]: Failed password for root from 222.186.31.83 port 51137 ssh2
...
2020-06-10 22:55:59
27.150.183.32 attack
Unauthorized access or intrusion attempt detected from Thor banned IP
2020-06-10 22:23:33
128.199.140.175 attack
Jun 10 17:00:10 ift sshd\[37641\]: Invalid user overwatch from 128.199.140.175Jun 10 17:00:11 ift sshd\[37641\]: Failed password for invalid user overwatch from 128.199.140.175 port 43134 ssh2Jun 10 17:05:04 ift sshd\[38640\]: Failed password for root from 128.199.140.175 port 44932 ssh2Jun 10 17:09:51 ift sshd\[39559\]: Invalid user test from 128.199.140.175Jun 10 17:09:54 ift sshd\[39559\]: Failed password for invalid user test from 128.199.140.175 port 46728 ssh2
...
2020-06-10 23:01:17
37.49.224.14 attackbots
Jun 10 07:56:51 XXX sshd[28440]: Did not receive identification string from 37.49.224.14
Jun 10 07:57:06 XXX sshd[28587]: Invalid user admin from 37.49.224.14
Jun 10 07:57:06 XXX sshd[28587]: Received disconnect from 37.49.224.14: 11: Normal Shutdown, Thank you for playing [preauth]
Jun 10 07:57:28 XXX sshd[28595]: Invalid user admin from 37.49.224.14
Jun 10 07:57:28 XXX sshd[28595]: Received disconnect from 37.49.224.14: 11: Normal Shutdown, Thank you for playing [preauth]
Jun 10 07:57:50 XXX sshd[28597]: User r.r from 37.49.224.14 not allowed because none of user's groups are listed in AllowGroups
Jun 10 07:57:50 XXX sshd[28597]: Received disconnect from 37.49.224.14: 11: Normal Shutdown, Thank you for playing [preauth]
Jun 10 07:58:11 XXX sshd[28776]: Invalid user ansible from 37.49.224.14
Jun 10 07:58:11 XXX sshd[28776]: Received disconnect from 37.49.224.14: 11: Normal Shutdown, Thank you for playing [preauth]
Jun 10 07:58:32 XXX sshd[28784]: Invalid user centos fr........
-------------------------------
2020-06-10 22:29:45

Recently Reported IPs

117.116.52.97 68.217.1.130 208.126.203.220 201.49.43.177
139.48.228.198 191.183.168.141 72.147.116.49 253.178.190.218
34.69.239.83 108.12.242.66 220.254.61.142 67.7.101.118
134.24.158.171 245.193.185.78 210.84.188.51 181.67.248.129
178.33.214.214 174.178.57.182 180.179.202.9 234.174.47.68