Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: Vodafone

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 93.148.49.207
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48251
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;93.148.49.207.			IN	A

;; AUTHORITY SECTION:
.			259	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020032201 1800 900 604800 86400

;; Query time: 104 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Mar 23 07:06:53 CST 2020
;; MSG SIZE  rcvd: 117
Host info
207.49.148.93.in-addr.arpa domain name pointer net-93-148-49-207.cust.dsl.teletu.it.
207.49.148.93.in-addr.arpa domain name pointer net-93-148-49-207.cust.vodafonedsl.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
207.49.148.93.in-addr.arpa	name = net-93-148-49-207.cust.dsl.teletu.it.
207.49.148.93.in-addr.arpa	name = net-93-148-49-207.cust.vodafonedsl.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
13.58.56.77 attackbotsspam
WordPress login Brute force / Web App Attack on client site.
2019-12-11 19:35:50
31.14.40.131 attack
Host Scan
2019-12-11 19:39:38
59.120.220.60 attackbotsspam
Automatic report - FTP Brute Force
2019-12-11 19:30:54
122.53.71.51 attackbotsspam
Host Scan
2019-12-11 19:45:50
106.253.177.150 attackspambots
$f2bV_matches
2019-12-11 19:50:15
51.75.248.127 attackspambots
[Aegis] @ 2019-12-11 08:39:20  0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-12-11 19:48:21
192.144.204.101 attackspam
Dec 11 09:34:07 MK-Soft-VM8 sshd[16641]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.144.204.101 
Dec 11 09:34:09 MK-Soft-VM8 sshd[16641]: Failed password for invalid user dovecot from 192.144.204.101 port 43644 ssh2
...
2019-12-11 19:32:29
222.186.169.192 attack
Dec 11 11:31:07 ip-172-31-62-245 sshd\[10625\]: Failed password for root from 222.186.169.192 port 10480 ssh2\
Dec 11 11:31:11 ip-172-31-62-245 sshd\[10625\]: Failed password for root from 222.186.169.192 port 10480 ssh2\
Dec 11 11:31:14 ip-172-31-62-245 sshd\[10625\]: Failed password for root from 222.186.169.192 port 10480 ssh2\
Dec 11 11:31:17 ip-172-31-62-245 sshd\[10625\]: Failed password for root from 222.186.169.192 port 10480 ssh2\
Dec 11 11:31:20 ip-172-31-62-245 sshd\[10625\]: Failed password for root from 222.186.169.192 port 10480 ssh2\
2019-12-11 19:36:14
77.247.109.65 attackspambots
MultiHost/MultiPort Probe, Scan, Hack -
2019-12-11 19:39:03
106.13.57.216 attack
2019-12-11T08:30:07.126703abusebot-2.cloudsearch.cf sshd\[18727\]: Invalid user ignagni from 106.13.57.216 port 45680
2019-12-11 20:10:51
51.75.147.100 attack
Dec 11 10:49:19 hosting sshd[1008]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=ns3134519.ip-51-75-147.eu  user=backup
Dec 11 10:49:22 hosting sshd[1008]: Failed password for backup from 51.75.147.100 port 35568 ssh2
...
2019-12-11 19:55:50
182.150.28.144 attackbotsspam
Dec 10 23:08:07 kapalua sshd\[12704\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.150.28.144  user=root
Dec 10 23:08:10 kapalua sshd\[12704\]: Failed password for root from 182.150.28.144 port 44417 ssh2
Dec 10 23:15:16 kapalua sshd\[13575\]: Invalid user faucher from 182.150.28.144
Dec 10 23:15:16 kapalua sshd\[13575\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.150.28.144
Dec 10 23:15:18 kapalua sshd\[13575\]: Failed password for invalid user faucher from 182.150.28.144 port 44481 ssh2
2019-12-11 20:07:12
36.90.214.56 attack
Unauthorized connection attempt detected from IP address 36.90.214.56 to port 445
2019-12-11 19:56:17
85.136.114.4 attackbotsspam
Invalid user zu from 85.136.114.4 port 60592
2019-12-11 19:47:47
120.88.46.226 attackbotsspam
Dec 11 10:33:14 vpn01 sshd[21548]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=120.88.46.226
Dec 11 10:33:16 vpn01 sshd[21548]: Failed password for invalid user ekren from 120.88.46.226 port 59550 ssh2
...
2019-12-11 19:37:16

Recently Reported IPs

211.134.19.178 5.160.36.177 5.101.51.48 115.214.111.160
24.253.91.51 58.147.180.92 111.199.26.0 198.46.242.175
134.209.159.127 88.247.97.176 13.233.114.178 112.167.30.36
114.233.71.221 121.150.172.230 95.218.135.125 179.184.152.39
114.233.71.178 217.42.131.161 106.12.56.41 223.97.192.33