Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.69.158.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28740
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.69.158.48.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025012201 1800 900 604800 86400

;; Query time: 40 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jan 23 05:14:44 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 48.158.69.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.158.69.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
185.143.172.134 attack
Fail2Ban Ban Triggered
SMTP Abuse Attempt
2019-11-02 00:11:15
157.230.240.34 attack
Nov  1 16:45:23 gw1 sshd[20902]: Failed password for root from 157.230.240.34 port 46192 ssh2
Nov  1 16:49:39 gw1 sshd[20992]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.240.34
...
2019-11-02 00:09:36
77.247.108.119 attackspam
Connection by 77.247.108.119 on port: 8188 got caught by honeypot at 11/1/2019 3:36:11 PM
2019-11-01 23:52:11
143.208.137.209 attackbotsspam
port scan and connect, tcp 1433 (ms-sql-s)
2019-11-01 23:28:01
45.136.110.47 attackspam
Automatic report - Port Scan
2019-11-02 00:00:42
39.43.73.90 attack
" "
2019-11-01 23:37:08
46.225.128.202 attack
Sending SPAM email
2019-11-01 23:47:54
132.145.80.60 attackspam
Port scan: Attack repeated for 24 hours
2019-11-01 23:36:03
123.110.50.108 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/123.110.50.108/ 
 
 TW - 1H : (99)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN131596 
 
 IP : 123.110.50.108 
 
 CIDR : 123.110.48.0/22 
 
 PREFIX COUNT : 343 
 
 UNIQUE IP COUNT : 351232 
 
 
 ATTACKS DETECTED ASN131596 :  
  1H - 2 
  3H - 2 
  6H - 2 
 12H - 2 
 24H - 2 
 
 DateTime : 2019-11-01 12:50:04 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-11-01 23:48:25
112.186.77.86 attackspambots
SSH authentication failure x 6 reported by Fail2Ban
...
2019-11-01 23:38:20
188.131.173.220 attack
Nov  1 16:01:51 vmanager6029 sshd\[19389\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.173.220  user=root
Nov  1 16:01:53 vmanager6029 sshd\[19389\]: Failed password for root from 188.131.173.220 port 33884 ssh2
Nov  1 16:07:51 vmanager6029 sshd\[19612\]: Invalid user prueba from 188.131.173.220 port 40482
Nov  1 16:07:51 vmanager6029 sshd\[19612\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.131.173.220
2019-11-01 23:55:42
103.1.239.135 attack
xmlrpc attack
2019-11-01 23:43:55
185.200.118.73 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-11-02 00:06:46
159.224.220.209 attackbots
2019-11-01T15:55:28.415767abusebot-3.cloudsearch.cf sshd\[10575\]: Invalid user administrador from 159.224.220.209 port 43842
2019-11-01 23:58:28
103.48.180.117 attack
SSH Brute-Force reported by Fail2Ban
2019-11-02 00:04:19

Recently Reported IPs

77.98.193.236 214.147.64.112 156.191.94.45 21.86.1.205
72.159.188.206 2.108.184.213 33.68.158.102 142.12.160.116
53.26.24.204 122.109.48.54 181.191.141.210 201.50.151.148
86.101.96.201 241.165.251.218 9.167.211.164 162.8.214.176
148.222.255.233 57.2.186.214 250.230.197.62 249.195.209.111