Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Hawthorne

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.148.49.13
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7426
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;98.148.49.13.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021202 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Feb 13 12:39:02 CST 2025
;; MSG SIZE  rcvd: 105
Host info
13.49.148.98.in-addr.arpa domain name pointer syn-098-148-049-013.res.spectrum.com.
Nslookup info:
b'13.49.148.98.in-addr.arpa	name = syn-098-148-049-013.res.spectrum.com.

Authoritative answers can be found from:

'
Related IP info:
Related comments:
IP Type Details Datetime
111.229.155.209 attackspambots
Invalid user deddy from 111.229.155.209 port 21541
2020-07-19 02:29:26
124.167.226.214 attackspambots
Jul 18 20:51:16 mout sshd[19214]: Invalid user admin from 124.167.226.214 port 55749
2020-07-19 02:58:14
49.232.51.149 attack
2020-07-18T16:43:02.660921ks3355764 sshd[2729]: Invalid user dut from 49.232.51.149 port 55056
2020-07-18T16:43:05.316239ks3355764 sshd[2729]: Failed password for invalid user dut from 49.232.51.149 port 55056 ssh2
...
2020-07-19 02:39:25
129.126.244.51 attack
2020-07-18T04:18:40.145779hostname sshd[124331]: Failed password for invalid user 66.201.32.14 from 129.126.244.51 port 55482 ssh2
...
2020-07-19 02:26:05
200.199.227.194 attack
SSH BruteForce Attack
2020-07-19 02:45:01
109.175.166.34 attackspam
Invalid user alejandra from 109.175.166.34 port 59128
2020-07-19 03:01:35
116.236.200.254 attackspambots
Jul 18 19:44:16 ns382633 sshd\[24931\]: Invalid user user from 116.236.200.254 port 43100
Jul 18 19:44:16 ns382633 sshd\[24931\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.200.254
Jul 18 19:44:18 ns382633 sshd\[24931\]: Failed password for invalid user user from 116.236.200.254 port 43100 ssh2
Jul 18 19:54:54 ns382633 sshd\[26753\]: Invalid user telnet from 116.236.200.254 port 39342
Jul 18 19:54:54 ns382633 sshd\[26753\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=116.236.200.254
2020-07-19 03:00:13
129.211.124.29 attackbotsspam
Invalid user shibo from 129.211.124.29 port 37852
2020-07-19 02:57:33
79.129.29.237 attack
Jul 18 20:32:40 vps333114 sshd[6749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=xtypos.static.otenet.gr
Jul 18 20:32:41 vps333114 sshd[6749]: Failed password for invalid user guest from 79.129.29.237 port 58012 ssh2
...
2020-07-19 02:34:27
122.51.177.151 attack
Invalid user sge from 122.51.177.151 port 53322
2020-07-19 02:58:34
162.247.74.27 attackbotsspam
\[Sat Jul 18 16:54:34.803157 2020\] \[authz_core:error\] \[pid 104348\] \[client 162.247.74.27:60418\] AH01630: client denied by server configuration: /usr/lib/cgi-bin/php4.cgi
\[Sat Jul 18 16:54:35.125989 2020\] \[authz_core:error\] \[pid 104348\] \[client 162.247.74.27:60418\] AH01630: client denied by server configuration: /usr/lib/cgi-bin/php5.cgi
\[Sat Jul 18 16:54:35.717173 2020\] \[authz_core:error\] \[pid 104348\] \[client 162.247.74.27:60418\] AH01630: client denied by server configuration: /usr/lib/cgi-bin/php-cgi
...
2020-07-19 02:53:29
103.69.125.74 attack
Invalid user info from 103.69.125.74 port 49228
2020-07-19 03:04:25
177.137.96.15 attack
Invalid user ghanshyam from 177.137.96.15 port 58686
2020-07-19 02:50:39
112.172.147.34 attackbots
Jul 18 21:12:04 webhost01 sshd[27908]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.172.147.34
Jul 18 21:12:06 webhost01 sshd[27908]: Failed password for invalid user kiku from 112.172.147.34 port 39718 ssh2
...
2020-07-19 03:00:53
145.239.7.78 attack
20 attempts against mh-misbehave-ban on storm
2020-07-19 02:55:51

Recently Reported IPs

165.95.43.196 95.154.5.137 24.8.219.115 98.92.243.211
70.21.158.190 154.208.59.178 181.186.200.6 223.234.171.197
132.51.69.63 233.56.72.228 26.33.207.154 36.8.107.192
163.135.110.33 9.9.86.134 145.75.33.45 12.204.10.66
48.143.95.70 229.68.116.151 230.70.99.164 140.38.134.11