Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Albuquerque

Region: New Mexico

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 98.48.13.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25898
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;98.48.13.149.			IN	A

;; AUTHORITY SECTION:
.			430	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123101 1800 900 604800 86400

;; Query time: 18 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 01 10:27:51 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 149.13.48.98.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 149.13.48.98.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
80.211.13.167 attackspam
web-1 [ssh_2] SSH Attack
2019-10-15 00:52:08
202.61.45.51 attack
3389BruteforceStormFW22
2019-10-15 00:28:08
178.128.117.68 attackbotsspam
Automatic report - XMLRPC Attack
2019-10-15 00:26:30
122.155.223.127 attackspambots
Unauthorized SSH login attempts
2019-10-15 00:24:47
49.247.132.79 attackspam
Oct 14 16:47:51 apollo sshd\[12772\]: Failed password for root from 49.247.132.79 port 58958 ssh2Oct 14 17:03:11 apollo sshd\[12822\]: Failed password for root from 49.247.132.79 port 44560 ssh2Oct 14 17:07:31 apollo sshd\[12843\]: Invalid user agostinelli from 49.247.132.79
...
2019-10-15 00:54:59
185.90.118.18 attackspambots
10/14/2019-12:14:16.744199 185.90.118.18 Protocol: 6 ET SCAN Potential SSH Scan
2019-10-15 00:31:30
106.12.98.168 attack
Oct 14 15:31:06 markkoudstaal sshd[4151]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.168
Oct 14 15:31:08 markkoudstaal sshd[4151]: Failed password for invalid user cinstall from 106.12.98.168 port 41578 ssh2
Oct 14 15:34:46 markkoudstaal sshd[4433]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.98.168
2019-10-15 00:29:25
125.68.57.101 attackbots
Unauthorised access (Oct 14) SRC=125.68.57.101 LEN=40 TOS=0x10 PREC=0x40 TTL=241 ID=51441 TCP DPT=445 WINDOW=1024 SYN
2019-10-15 00:31:53
46.185.114.158 attack
0,19-02/02 [bc01/m25] PostRequest-Spammer scoring: essen
2019-10-15 00:34:32
142.93.198.152 attackbots
Oct 14 01:38:44 sachi sshd\[1455\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.152  user=root
Oct 14 01:38:45 sachi sshd\[1455\]: Failed password for root from 142.93.198.152 port 50902 ssh2
Oct 14 01:42:57 sachi sshd\[1883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.152  user=root
Oct 14 01:43:00 sachi sshd\[1883\]: Failed password for root from 142.93.198.152 port 34090 ssh2
Oct 14 01:47:10 sachi sshd\[2273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=142.93.198.152  user=root
2019-10-15 00:50:53
148.66.135.17 attackspam
xmlrpc attack
2019-10-15 00:32:45
106.12.25.143 attackspambots
SSH/22 MH Probe, BF, Hack -
2019-10-15 00:58:01
192.42.116.25 attackspambots
Oct 14 13:47:44 sso sshd[11210]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=192.42.116.25
Oct 14 13:47:46 sso sshd[11210]: Failed password for invalid user 101 from 192.42.116.25 port 42178 ssh2
...
2019-10-15 00:30:40
62.210.37.82 attackspam
Oct 14 13:47:58 sso sshd[11265]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.210.37.82
Oct 14 13:48:00 sso sshd[11265]: Failed password for invalid user 1111 from 62.210.37.82 port 34511 ssh2
...
2019-10-15 00:27:09
40.73.96.53 attack
Oct 14 18:42:33 sauna sshd[192993]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=40.73.96.53
Oct 14 18:42:35 sauna sshd[192993]: Failed password for invalid user lincoln from 40.73.96.53 port 46800 ssh2
...
2019-10-15 01:04:40

Recently Reported IPs

225.61.252.93 100.125.179.78 192.125.83.32 7.190.198.54
36.113.146.77 10.188.253.14 150.222.241.240 69.139.99.194
51.210.181.47 178.73.120.67 40.52.38.3 144.217.207.21
3.254.68.13 84.47.99.146 169.88.207.106 174.178.68.146
10.176.84.135 52.112.30.151 242.228.83.121 53.239.123.184