Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Kyle

Region: Texas

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
72.48.234.137 attackspam
Sep 18 02:52:24 intra sshd\[58705\]: Invalid user admin from 72.48.234.137Sep 18 02:52:27 intra sshd\[58705\]: Failed password for invalid user admin from 72.48.234.137 port 50012 ssh2Sep 18 02:52:28 intra sshd\[58707\]: Invalid user admin from 72.48.234.137Sep 18 02:52:31 intra sshd\[58707\]: Failed password for invalid user admin from 72.48.234.137 port 50183 ssh2Sep 18 02:52:33 intra sshd\[58709\]: Invalid user admin from 72.48.234.137Sep 18 02:52:35 intra sshd\[58709\]: Failed password for invalid user admin from 72.48.234.137 port 50251 ssh2
...
2020-09-18 20:25:12
72.48.234.137 attack
Sep 18 02:52:24 intra sshd\[58705\]: Invalid user admin from 72.48.234.137Sep 18 02:52:27 intra sshd\[58705\]: Failed password for invalid user admin from 72.48.234.137 port 50012 ssh2Sep 18 02:52:28 intra sshd\[58707\]: Invalid user admin from 72.48.234.137Sep 18 02:52:31 intra sshd\[58707\]: Failed password for invalid user admin from 72.48.234.137 port 50183 ssh2Sep 18 02:52:33 intra sshd\[58709\]: Invalid user admin from 72.48.234.137Sep 18 02:52:35 intra sshd\[58709\]: Failed password for invalid user admin from 72.48.234.137 port 50251 ssh2
...
2020-09-18 12:43:36
72.48.234.137 attack
(sshd) Failed SSH login from 72.48.234.137 (US/United States/72-48-234-137.static.grandenetworks.net): 5 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Sep 17 13:01:55 server sshd[22497]: Invalid user admin from 72.48.234.137 port 42722
Sep 17 13:01:56 server sshd[22497]: Failed password for invalid user admin from 72.48.234.137 port 42722 ssh2
Sep 17 13:01:57 server sshd[22502]: Invalid user admin from 72.48.234.137 port 42778
Sep 17 13:01:59 server sshd[22502]: Failed password for invalid user admin from 72.48.234.137 port 42778 ssh2
Sep 17 13:01:59 server sshd[22519]: Invalid user admin from 72.48.234.137 port 42859
2020-09-18 02:58:17
72.48.214.68 attack
2019-12-01T09:27:55.297438suse-nuc sshd[25410]: Invalid user user from 72.48.214.68 port 36442
...
2020-02-18 09:50:37
72.48.214.68 attackbotsspam
Feb  1 13:20:09 sachi sshd\[26486\]: Invalid user ts3srv from 72.48.214.68
Feb  1 13:20:09 sachi sshd\[26486\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=opengridcomputing.com
Feb  1 13:20:11 sachi sshd\[26486\]: Failed password for invalid user ts3srv from 72.48.214.68 port 41206 ssh2
Feb  1 13:24:05 sachi sshd\[26533\]: Invalid user 12345 from 72.48.214.68
Feb  1 13:24:05 sachi sshd\[26533\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=opengridcomputing.com
2020-02-02 07:30:54
72.48.214.68 attack
Jan 31 19:49:38 pkdns2 sshd\[18319\]: Invalid user kapardini from 72.48.214.68Jan 31 19:49:40 pkdns2 sshd\[18319\]: Failed password for invalid user kapardini from 72.48.214.68 port 44790 ssh2Jan 31 19:53:21 pkdns2 sshd\[18506\]: Invalid user sourabhi from 72.48.214.68Jan 31 19:53:23 pkdns2 sshd\[18506\]: Failed password for invalid user sourabhi from 72.48.214.68 port 44552 ssh2Jan 31 19:56:57 pkdns2 sshd\[18656\]: Invalid user zakariya from 72.48.214.68Jan 31 19:56:59 pkdns2 sshd\[18656\]: Failed password for invalid user zakariya from 72.48.214.68 port 42598 ssh2
...
2020-02-01 02:19:50
72.48.214.68 attackbots
Unauthorized connection attempt detected from IP address 72.48.214.68 to port 2220 [J]
2020-01-18 17:55:44
72.48.214.68 attack
Jan 14 03:44:31 firewall sshd[12699]: Invalid user admin from 72.48.214.68
Jan 14 03:44:32 firewall sshd[12699]: Failed password for invalid user admin from 72.48.214.68 port 38184 ssh2
Jan 14 03:47:04 firewall sshd[12770]: Invalid user sx from 72.48.214.68
...
2020-01-14 15:50:25
72.48.214.68 attackbots
Jan  4 11:22:31 vps46666688 sshd[28303]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Jan  4 11:22:33 vps46666688 sshd[28303]: Failed password for invalid user testftp from 72.48.214.68 port 57904 ssh2
...
2020-01-04 23:43:52
72.48.214.68 attackbots
Nov 29 21:38:26 microserver sshd[28655]: Invalid user php from 72.48.214.68 port 52284
Nov 29 21:38:26 microserver sshd[28655]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 21:38:28 microserver sshd[28655]: Failed password for invalid user php from 72.48.214.68 port 52284 ssh2
Nov 29 21:38:38 microserver sshd[28689]: Invalid user usuario from 72.48.214.68 port 52652
Nov 29 21:38:38 microserver sshd[28689]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 22:04:42 microserver sshd[32999]: Invalid user dennis from 72.48.214.68 port 35318
Nov 29 22:04:42 microserver sshd[32999]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
Nov 29 22:04:44 microserver sshd[32999]: Failed password for invalid user dennis from 72.48.214.68 port 35318 ssh2
Nov 29 22:04:52 microserver sshd[33010]: Invalid user tao from 72.48.214.68 port 35718
Nov 29 22:04:52
2019-11-30 04:13:13
72.48.214.68 attackspambots
2019-11-29T07:03:19.081872abusebot-8.cloudsearch.cf sshd\[14597\]: Invalid user christene from 72.48.214.68 port 47934
2019-11-29 19:10:36
72.48.214.68 attackspam
Nov 28 23:31:11 webhost01 sshd[4637]: Failed password for mysql from 72.48.214.68 port 49838 ssh2
Nov 28 23:31:40 webhost01 sshd[4647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68
...
2019-11-29 01:03:06
72.48.214.68 attackbotsspam
fraudulent SSH attempt
2019-11-20 03:13:13
72.48.214.68 attackspam
Nov 17 18:29:36 icinga sshd[58019]: Failed password for root from 72.48.214.68 port 51284 ssh2
Nov 17 18:33:50 icinga sshd[62233]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=72.48.214.68 
Nov 17 18:33:52 icinga sshd[62233]: Failed password for invalid user operator from 72.48.214.68 port 50124 ssh2
...
2019-11-18 01:43:31
72.48.214.68 attackspambots
2019-11-14T08:22:24.5173251495-001 sshd\[27152\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=opengridcomputing.com
2019-11-14T08:22:26.8329231495-001 sshd\[27152\]: Failed password for invalid user glasshd from 72.48.214.68 port 54792 ssh2
2019-11-14T09:24:05.6184371495-001 sshd\[30120\]: Invalid user gellerman from 72.48.214.68 port 50596
2019-11-14T09:24:05.6255391495-001 sshd\[30120\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=opengridcomputing.com
2019-11-14T09:24:07.3887181495-001 sshd\[30120\]: Failed password for invalid user gellerman from 72.48.214.68 port 50596 ssh2
2019-11-14T09:28:18.2369921495-001 sshd\[30267\]: Invalid user rachel from 72.48.214.68 port 46584
2019-11-14T09:28:18.2400921495-001 sshd\[30267\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=opengridcomputing.com
...
2019-11-15 00:53:34
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 72.48.2.6
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48028
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;72.48.2.6.			IN	A

;; AUTHORITY SECTION:
.			502	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022051900 1800 900 604800 86400

;; Query time: 24 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu May 19 15:19:10 CST 2022
;; MSG SIZE  rcvd: 102
Host info
6.2.48.72.in-addr.arpa domain name pointer 72-48-2-6.dyn.grandenetworks.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
6.2.48.72.in-addr.arpa	name = 72-48-2-6.dyn.grandenetworks.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
36.227.130.104 attack
Honeypot attack, port: 23, PTR: 36-227-130-104.dynamic-ip.hinet.net.
2019-10-21 14:38:31
110.136.167.53 attackbotsspam
Automatic report - Port Scan Attack
2019-10-21 14:07:43
106.12.181.184 attack
Oct 21 08:13:20 ns381471 sshd[29665]: Failed password for proxy from 106.12.181.184 port 36060 ssh2
Oct 21 08:17:45 ns381471 sshd[29836]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.181.184
Oct 21 08:17:46 ns381471 sshd[29836]: Failed password for invalid user pos from 106.12.181.184 port 42650 ssh2
2019-10-21 14:37:35
188.26.125.126 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-21 14:12:14
202.109.132.200 attackbotsspam
Oct 21 04:10:56 www_kotimaassa_fi sshd[24714]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.109.132.200
Oct 21 04:10:59 www_kotimaassa_fi sshd[24714]: Failed password for invalid user ws from 202.109.132.200 port 38214 ssh2
...
2019-10-21 14:23:47
121.165.66.226 attackbots
Oct 21 06:58:38 MK-Soft-VM4 sshd[21663]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=121.165.66.226 
Oct 21 06:58:40 MK-Soft-VM4 sshd[21663]: Failed password for invalid user ulbrechT from 121.165.66.226 port 52332 ssh2
...
2019-10-21 14:02:59
42.243.71.121 attackbots
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-21 14:15:53
176.31.128.45 attackspam
2019-10-21T05:21:35.655429shield sshd\[1806\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps06.bubbleswave.com  user=root
2019-10-21T05:21:38.348703shield sshd\[1806\]: Failed password for root from 176.31.128.45 port 37188 ssh2
2019-10-21T05:25:22.480232shield sshd\[2918\]: Invalid user jackholdem from 176.31.128.45 port 47324
2019-10-21T05:25:22.484386shield sshd\[2918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=vps06.bubbleswave.com
2019-10-21T05:25:24.337507shield sshd\[2918\]: Failed password for invalid user jackholdem from 176.31.128.45 port 47324 ssh2
2019-10-21 14:28:20
213.23.12.149 attack
T: f2b 404 5x
2019-10-21 14:23:31
172.94.125.147 attackbotsspam
Oct 21 08:05:01 SilenceServices sshd[32317]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.125.147
Oct 21 08:05:03 SilenceServices sshd[32317]: Failed password for invalid user usertest from 172.94.125.147 port 44222 ssh2
Oct 21 08:08:53 SilenceServices sshd[937]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=172.94.125.147
2019-10-21 14:11:19
193.32.163.182 attackspambots
Oct 21 08:15:34 cvbnet sshd[5236]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.32.163.182 
Oct 21 08:15:36 cvbnet sshd[5236]: Failed password for invalid user admin from 193.32.163.182 port 55631 ssh2
...
2019-10-21 14:17:32
80.91.192.165 attack
[portscan] Port scan
2019-10-21 14:39:58
101.21.107.6 attackbotsspam
Honeypot attack, port: 23, PTR: PTR record not found
2019-10-21 14:40:39
186.170.28.46 attack
Oct 20 20:19:50 sachi sshd\[16149\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.170.28.46  user=root
Oct 20 20:19:52 sachi sshd\[16149\]: Failed password for root from 186.170.28.46 port 39436 ssh2
Oct 20 20:24:33 sachi sshd\[16535\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.170.28.46  user=root
Oct 20 20:24:35 sachi sshd\[16535\]: Failed password for root from 186.170.28.46 port 58869 ssh2
Oct 20 20:29:17 sachi sshd\[16918\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.170.28.46  user=root
2019-10-21 14:36:25
222.186.180.41 attackspambots
Oct 21 01:34:47 server sshd\[11285\]: Failed password for root from 222.186.180.41 port 36006 ssh2
Oct 21 01:34:49 server sshd\[11294\]: Failed password for root from 222.186.180.41 port 23548 ssh2
Oct 21 09:31:46 server sshd\[10813\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Oct 21 09:31:48 server sshd\[10819\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.180.41  user=root
Oct 21 09:31:49 server sshd\[10813\]: Failed password for root from 222.186.180.41 port 49680 ssh2
...
2019-10-21 14:33:14

Recently Reported IPs

180.79.177.77 241.234.224.164 140.49.76.212 93.19.247.22
77.199.234.218 46.249.76.4 83.236.115.14 78.47.15.252
99.85.151.171 154.109.225.167 195.119.120.246 35.115.220.164
73.46.106.28 97.190.187.115 172.102.216.172 97.95.160.80
83.106.172.120 104.25.134.185 185.97.2.38 217.180.196.107