Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Łódź

Region: Łódź Voivodeship

Country: Poland

Internet Service Provider: Orange

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 95.48.14.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45149
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;95.48.14.149.			IN	A

;; AUTHORITY SECTION:
.			474	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020070801 1800 900 604800 86400

;; Query time: 45 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jul 09 07:57:33 CST 2020
;; MSG SIZE  rcvd: 116
Host info
149.14.48.95.in-addr.arpa domain name pointer iuo149.internetdsl.tpnet.pl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.14.48.95.in-addr.arpa	name = iuo149.internetdsl.tpnet.pl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
91.183.53.241 attackspam
Ich habe die verdammte Nachricht verpasst
2019-08-10 10:40:28
217.182.79.245 attackspambots
Aug 10 04:41:15 SilenceServices sshd[11269]: Failed password for root from 217.182.79.245 port 50878 ssh2
Aug 10 04:47:27 SilenceServices sshd[15834]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=217.182.79.245
Aug 10 04:47:30 SilenceServices sshd[15834]: Failed password for invalid user mina from 217.182.79.245 port 46986 ssh2
2019-08-10 11:05:08
134.209.63.54 attackbotsspam
400 BAD REQUEST
2019-08-10 11:06:09
128.199.80.59 attackspam
Brute force SMTP login attempted.
...
2019-08-10 10:50:15
212.227.15.14 attackbots
Aufgepasst: Immobilienpreise auf Rekordhoch
2019-08-10 10:43:24
40.118.46.159 attackspam
Aug 10 03:30:12 mail sshd\[2041\]: Failed password for invalid user audi from 40.118.46.159 port 52136 ssh2
Aug 10 03:47:55 mail sshd\[2256\]: Invalid user tomas from 40.118.46.159 port 44074
Aug 10 03:47:55 mail sshd\[2256\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.118.46.159
...
2019-08-10 10:53:05
191.53.238.32 attack
Brute force attack stopped by firewall
2019-08-10 10:48:34
196.52.43.129 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-08-10 11:01:32
128.252.26.7 attackspam
Brute force SMTP login attempted.
...
2019-08-10 10:25:15
86.34.230.162 attack
Automatic report - Port Scan Attack
2019-08-10 10:58:22
128.199.87.57 attack
Brute force SMTP login attempted.
...
2019-08-10 10:44:15
209.85.128.67 attackspam
Laufende Wohltätigkeit Spenden Nachrichtenbrief
2019-08-10 10:33:01
18.18.248.17 attackspam
ssh failed login
2019-08-10 10:23:09
128.78.122.47 attack
Brute force SMTP login attempted.
...
2019-08-10 10:22:02
96.69.10.237 attackbotsspam
Aug  9 23:38:58 lnxded63 sshd[8275]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=96.69.10.237
2019-08-10 10:24:51

Recently Reported IPs

37.6.173.231 66.122.91.56 14.115.88.243 179.172.115.58
5.10.189.173 5.236.130.42 64.175.188.195 176.203.92.3
171.88.173.130 100.247.254.103 134.91.200.120 1.164.203.22
95.50.51.138 216.98.95.58 77.215.128.205 202.109.239.173
83.48.34.40 92.55.39.73 175.55.200.170 82.17.218.141