Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.9.97.94
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 36872
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.9.97.94.			IN	A

;; AUTHORITY SECTION:
.			600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023052400 1800 900 604800 86400

;; Query time: 69 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed May 24 16:15:23 CST 2023
;; MSG SIZE  rcvd: 103
Host info
Host 94.97.9.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 94.97.9.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.45.183.136 attackspambots
(sshd) Failed SSH login from 103.45.183.136 (CN/China/-): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Oct  1 09:13:38 server2 sshd[4248]: Invalid user debian from 103.45.183.136 port 52388
Oct  1 09:13:40 server2 sshd[4248]: Failed password for invalid user debian from 103.45.183.136 port 52388 ssh2
Oct  1 09:32:29 server2 sshd[7236]: Invalid user postgres from 103.45.183.136 port 60694
Oct  1 09:32:31 server2 sshd[7236]: Failed password for invalid user postgres from 103.45.183.136 port 60694 ssh2
Oct  1 09:38:54 server2 sshd[8216]: Invalid user server from 103.45.183.136 port 58276
2020-10-01 18:51:47
159.135.230.209 attackspambots
2020-09-30 20:34:56 wonderland sendmail[7237]: 08UIYpnK007237: m230-209.mailgun.net [159.135.230.209] did not issue MAIL/EXPN/VRFY/ETRN during connection to MTA
2020-10-01 18:21:52
165.84.180.37 attack
Invalid user guest from 165.84.180.37 port 10760
2020-10-01 18:27:23
45.129.33.148 attackspambots
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-10-01 18:34:46
51.178.81.106 attackbots
51.178.81.106 - - [01/Oct/2020:04:02:01 +0200] "GET /wp-login.php HTTP/1.1" 200 9061 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.178.81.106 - - [01/Oct/2020:04:02:02 +0200] "POST /wp-login.php HTTP/1.1" 200 9312 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.178.81.106 - - [01/Oct/2020:04:02:02 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-10-01 18:56:05
60.220.185.22 attackbots
Oct  1 08:22:16 ns382633 sshd\[17661\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.185.22  user=root
Oct  1 08:22:18 ns382633 sshd\[17661\]: Failed password for root from 60.220.185.22 port 45830 ssh2
Oct  1 08:40:39 ns382633 sshd\[21103\]: Invalid user bash from 60.220.185.22 port 60326
Oct  1 08:40:39 ns382633 sshd\[21103\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=60.220.185.22
Oct  1 08:40:41 ns382633 sshd\[21103\]: Failed password for invalid user bash from 60.220.185.22 port 60326 ssh2
2020-10-01 18:19:08
142.93.226.235 attackspam
142.93.226.235 - - [01/Oct/2020:10:54:27 +0100] "POST /wp-login.php HTTP/1.1" 200 2604 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.226.235 - - [01/Oct/2020:10:54:29 +0100] "POST /wp-login.php HTTP/1.1" 200 2580 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
142.93.226.235 - - [01/Oct/2020:10:54:30 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-01 18:30:52
62.210.185.4 attackbots
62.210.185.4 - - [01/Oct/2020:04:41:10 +0100] "POST /wp-login.php HTTP/1.1" 200 2302 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
62.210.185.4 - - [01/Oct/2020:04:41:11 +0100] "POST /wp-login.php HTTP/1.1" 200 2238 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
62.210.185.4 - - [01/Oct/2020:04:41:12 +0100] "POST /wp-login.php HTTP/1.1" 200 2234 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-10-01 18:47:15
61.83.210.246 attackbots
2020-10-01T12:00:20.088549n23.at sshd[39394]: Invalid user testftp from 61.83.210.246 port 56778
2020-10-01T12:00:22.291195n23.at sshd[39394]: Failed password for invalid user testftp from 61.83.210.246 port 56778 ssh2
2020-10-01T12:06:02.228051n23.at sshd[43422]: Invalid user honda from 61.83.210.246 port 35974
...
2020-10-01 18:46:48
58.87.84.31 attackbotsspam
Oct  1 16:00:46 dhoomketu sshd[3494587]: Failed password for root from 58.87.84.31 port 44650 ssh2
Oct  1 16:04:32 dhoomketu sshd[3494651]: Invalid user monitor from 58.87.84.31 port 49716
Oct  1 16:04:32 dhoomketu sshd[3494651]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=58.87.84.31 
Oct  1 16:04:32 dhoomketu sshd[3494651]: Invalid user monitor from 58.87.84.31 port 49716
Oct  1 16:04:34 dhoomketu sshd[3494651]: Failed password for invalid user monitor from 58.87.84.31 port 49716 ssh2
...
2020-10-01 18:45:13
68.183.186.65 attack
Sep 30 20:34:58 IngegnereFirenze sshd[8255]: Did not receive identification string from 68.183.186.65 port 60686
...
2020-10-01 18:34:59
74.120.14.34 attackspambots
Port scan detected
2020-10-01 18:58:20
94.159.31.10 attackbotsspam
Oct  1 15:14:58 web1 sshd[27083]: Invalid user guest1 from 94.159.31.10 port 23462
Oct  1 15:14:58 web1 sshd[27083]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.159.31.10
Oct  1 15:14:58 web1 sshd[27083]: Invalid user guest1 from 94.159.31.10 port 23462
Oct  1 15:15:00 web1 sshd[27083]: Failed password for invalid user guest1 from 94.159.31.10 port 23462 ssh2
Oct  1 15:26:14 web1 sshd[30819]: Invalid user snow from 94.159.31.10 port 49444
Oct  1 15:26:14 web1 sshd[30819]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.159.31.10
Oct  1 15:26:14 web1 sshd[30819]: Invalid user snow from 94.159.31.10 port 49444
Oct  1 15:26:16 web1 sshd[30819]: Failed password for invalid user snow from 94.159.31.10 port 49444 ssh2
Oct  1 15:29:58 web1 sshd[31998]: Invalid user user from 94.159.31.10 port 17924
...
2020-10-01 18:46:03
175.138.108.78 attack
2020-10-01T07:56:58.648833abusebot.cloudsearch.cf sshd[31995]: Invalid user ubuntu from 175.138.108.78 port 39823
2020-10-01T07:56:58.653728abusebot.cloudsearch.cf sshd[31995]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.108.78
2020-10-01T07:56:58.648833abusebot.cloudsearch.cf sshd[31995]: Invalid user ubuntu from 175.138.108.78 port 39823
2020-10-01T07:57:01.013801abusebot.cloudsearch.cf sshd[31995]: Failed password for invalid user ubuntu from 175.138.108.78 port 39823 ssh2
2020-10-01T08:01:12.729105abusebot.cloudsearch.cf sshd[32044]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.108.78  user=root
2020-10-01T08:01:14.958789abusebot.cloudsearch.cf sshd[32044]: Failed password for root from 175.138.108.78 port 44073 ssh2
2020-10-01T08:05:16.563964abusebot.cloudsearch.cf sshd[32089]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.138.108.78 
...
2020-10-01 18:43:17
82.77.18.151 attackspam
Automatic report - Port Scan Attack
2020-10-01 18:34:33

Recently Reported IPs

37.69.50.3 224.0.0.17 85.2.4.162 21.39.4.81
68.15.35.9 2.212.64.6 5.117.5.93 6.139.75.9
59.49.67.1 11.18.64.4 64.110.0.0 6.2.26.172
58.247.2.4 5.96.128.2 84.15.85.9 7.81.90.68
128.239.129.174 29.9.3.237 5.159.22.9 44.78.6.43