Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.72.141.111
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27293
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.72.141.111.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022200 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Feb 22 15:56:38 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 111.141.72.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 111.141.72.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
182.76.74.78 attack
(sshd) Failed SSH login from 182.76.74.78 (IN/India/nsg-static-78.74.76.182-airtel.com): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Apr  6 06:48:45 ubnt-55d23 sshd[27267]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.76.74.78  user=root
Apr  6 06:48:47 ubnt-55d23 sshd[27267]: Failed password for root from 182.76.74.78 port 9799 ssh2
2020-04-06 18:04:29
206.189.227.254 attackbots
Email rejected due to spam filtering
2020-04-06 18:08:04
66.70.130.153 attackspam
2020-04-05 UTC: (2x) - nproc,root
2020-04-06 18:16:55
113.190.139.55 attackspambots
1586145066 - 04/06/2020 05:51:06 Host: 113.190.139.55/113.190.139.55 Port: 445 TCP Blocked
2020-04-06 17:43:56
42.236.10.74 attack
Automatic report - Banned IP Access
2020-04-06 17:35:51
2.228.151.115 attackspambots
Apr  6 11:28:20 sip sshd[1649]: Failed password for root from 2.228.151.115 port 21701 ssh2
Apr  6 11:36:01 sip sshd[4513]: Failed password for root from 2.228.151.115 port 37724 ssh2
2020-04-06 17:46:38
27.254.130.67 attackspam
Apr  6 10:40:46 host sshd[50839]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=27.254.130.67  user=root
Apr  6 10:40:48 host sshd[50839]: Failed password for root from 27.254.130.67 port 41732 ssh2
...
2020-04-06 17:58:44
52.23.180.74 attackbots
(sshd) Failed SSH login from 52.23.180.74 (US/United States/ec2-52-23-180-74.compute-1.amazonaws.com): 5 in the last 3600 secs
2020-04-06 17:50:42
106.13.147.69 attackbotsspam
2020-04-06T06:58:10.023416shield sshd\[15924\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.69  user=root
2020-04-06T06:58:12.074970shield sshd\[15924\]: Failed password for root from 106.13.147.69 port 35212 ssh2
2020-04-06T07:00:17.752537shield sshd\[16288\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.69  user=root
2020-04-06T07:00:19.242851shield sshd\[16288\]: Failed password for root from 106.13.147.69 port 59138 ssh2
2020-04-06T07:02:14.781535shield sshd\[16621\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.147.69  user=root
2020-04-06 17:48:01
36.67.81.41 attack
Apr  6 00:56:25 rs-7 sshd[55095]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.81.41  user=r.r
Apr  6 00:56:28 rs-7 sshd[55095]: Failed password for r.r from 36.67.81.41 port 59762 ssh2
Apr  6 00:56:28 rs-7 sshd[55095]: Received disconnect from 36.67.81.41 port 59762:11: Bye Bye [preauth]
Apr  6 00:56:28 rs-7 sshd[55095]: Disconnected from 36.67.81.41 port 59762 [preauth]
Apr  6 01:08:22 rs-7 sshd[58689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.81.41  user=r.r
Apr  6 01:08:24 rs-7 sshd[58689]: Failed password for r.r from 36.67.81.41 port 48652 ssh2
Apr  6 01:08:24 rs-7 sshd[58689]: Received disconnect from 36.67.81.41 port 48652:11: Bye Bye [preauth]
Apr  6 01:08:24 rs-7 sshd[58689]: Disconnected from 36.67.81.41 port 48652 [preauth]
Apr  6 01:21:37 rs-7 sshd[62709]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=36.67.81.41  u........
-------------------------------
2020-04-06 18:09:21
185.176.27.54 attackspam
04/06/2020-05:46:14.506490 185.176.27.54 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-04-06 17:59:46
62.84.155.107 attackspambots
port scan and connect, tcp 23 (telnet)
2020-04-06 17:36:41
51.77.146.170 attackspambots
Apr  5 23:18:16 web1 sshd\[8439\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.170  user=root
Apr  5 23:18:18 web1 sshd\[8439\]: Failed password for root from 51.77.146.170 port 60140 ssh2
Apr  5 23:21:44 web1 sshd\[8712\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.170  user=root
Apr  5 23:21:46 web1 sshd\[8712\]: Failed password for root from 51.77.146.170 port 34898 ssh2
Apr  5 23:25:15 web1 sshd\[9049\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.146.170  user=root
2020-04-06 18:17:28
125.166.128.97 attackbotsspam
1586145048 - 04/06/2020 05:50:48 Host: 125.166.128.97/125.166.128.97 Port: 445 TCP Blocked
2020-04-06 18:02:29
45.167.250.19 attackspambots
Apr  6 00:02:33 ny01 sshd[19463]: Failed password for root from 45.167.250.19 port 58495 ssh2
Apr  6 00:04:13 ny01 sshd[19669]: Failed password for root from 45.167.250.19 port 43354 ssh2
2020-04-06 17:57:46

Recently Reported IPs

156.2.93.130 7.147.193.60 82.200.221.45 53.44.13.255
76.71.81.229 179.167.132.43 147.186.237.150 53.69.188.196
107.121.66.80 241.194.216.85 130.150.186.73 110.35.139.194
204.22.129.12 43.204.89.28 76.104.67.96 228.138.87.129
73.22.159.25 141.94.101.26 255.189.91.134 30.162.132.42