Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 99.45.4.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7559
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;99.45.4.48.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025031500 1800 900 604800 86400

;; Query time: 61 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 15 23:59:40 CST 2025
;; MSG SIZE  rcvd: 103
Host info
48.4.45.99.in-addr.arpa domain name pointer 99-45-4-48.lightspeed.rcsntx.sbcglobal.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.4.45.99.in-addr.arpa	name = 99-45-4-48.lightspeed.rcsntx.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
217.112.101.86 attack
$f2bV_matches
2020-05-04 20:15:10
113.184.15.139 attack
Unauthorized connection attempt from IP address 113.184.15.139 on Port 445(SMB)
2020-05-04 20:35:13
79.137.72.171 attackbots
May  4 14:35:21 lukav-desktop sshd\[14215\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.171  user=root
May  4 14:35:24 lukav-desktop sshd\[14215\]: Failed password for root from 79.137.72.171 port 60057 ssh2
May  4 14:42:17 lukav-desktop sshd\[19547\]: Invalid user lyq from 79.137.72.171
May  4 14:42:17 lukav-desktop sshd\[19547\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.171
May  4 14:42:19 lukav-desktop sshd\[19547\]: Failed password for invalid user lyq from 79.137.72.171 port 36922 ssh2
2020-05-04 19:53:50
69.30.221.250 attack
20 attempts against mh-misbehave-ban on cedar
2020-05-04 20:26:36
185.107.83.71 attackbotsspam
C1,WP GET /wp-login.php
2020-05-04 20:12:24
195.154.184.196 attackspam
May  4 14:07:43 srv-ubuntu-dev3 sshd[43588]: Invalid user admin from 195.154.184.196
May  4 14:07:43 srv-ubuntu-dev3 sshd[43588]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.184.196
May  4 14:07:43 srv-ubuntu-dev3 sshd[43588]: Invalid user admin from 195.154.184.196
May  4 14:07:45 srv-ubuntu-dev3 sshd[43588]: Failed password for invalid user admin from 195.154.184.196 port 54480 ssh2
May  4 14:11:52 srv-ubuntu-dev3 sshd[44185]: Invalid user cgl from 195.154.184.196
May  4 14:11:52 srv-ubuntu-dev3 sshd[44185]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.154.184.196
May  4 14:11:52 srv-ubuntu-dev3 sshd[44185]: Invalid user cgl from 195.154.184.196
May  4 14:11:54 srv-ubuntu-dev3 sshd[44185]: Failed password for invalid user cgl from 195.154.184.196 port 38986 ssh2
May  4 14:15:50 srv-ubuntu-dev3 sshd[44927]: Invalid user arif from 195.154.184.196
...
2020-05-04 20:27:36
54.37.66.73 attackspam
May  4 14:11:55 MainVPS sshd[16580]: Invalid user das from 54.37.66.73 port 46286
May  4 14:11:55 MainVPS sshd[16580]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=54.37.66.73
May  4 14:11:55 MainVPS sshd[16580]: Invalid user das from 54.37.66.73 port 46286
May  4 14:11:57 MainVPS sshd[16580]: Failed password for invalid user das from 54.37.66.73 port 46286 ssh2
May  4 14:15:56 MainVPS sshd[19961]: Invalid user git from 54.37.66.73 port 52201
...
2020-05-04 20:20:32
27.61.103.48 attackspam
Wordpress XMLRPC attack
2020-05-04 20:03:45
51.77.223.62 attackspam
51.77.223.62 - - [04/May/2020:06:13:27 +0200] "GET /wp-login.php HTTP/1.1" 200 5863 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.77.223.62 - - [04/May/2020:06:13:29 +0200] "POST /wp-login.php HTTP/1.1" 200 6114 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
51.77.223.62 - - [04/May/2020:06:13:30 +0200] "POST /xmlrpc.php HTTP/1.1" 200 427 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2020-05-04 19:56:13
185.176.27.174 attackbots
05/04/2020-07:12:40.849595 185.176.27.174 Protocol: 6 ET SCAN NMAP -sS window 1024
2020-05-04 20:07:51
113.140.4.194 attack
Icarus honeypot on github
2020-05-04 19:57:52
14.237.10.28 attackbots
Port probing on unauthorized port 445
2020-05-04 20:05:46
104.236.230.165 attack
May  4 13:49:58 legacy sshd[18869]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.236.230.165
May  4 13:50:00 legacy sshd[18869]: Failed password for invalid user evelynn from 104.236.230.165 port 36684 ssh2
May  4 13:52:57 legacy sshd[19008]: Failed password for root from 104.236.230.165 port 33797 ssh2
...
2020-05-04 19:53:29
140.143.157.236 attack
May  4 02:54:03 vps46666688 sshd[31163]: Failed password for root from 140.143.157.236 port 41410 ssh2
...
2020-05-04 20:01:23
199.249.230.70 attackbots
C1,WP GET /wp-login.php
2020-05-04 20:10:11

Recently Reported IPs

118.103.172.91 99.45.4.203 242.87.56.240 23.56.13.91
108.217.7.179 240.224.60.9 3.21.219.91 47.186.26.39
170.102.103.111 219.164.183.199 125.109.163.212 189.10.230.213
240.236.251.68 147.4.55.166 181.201.164.117 46.117.178.252
39.198.56.214 168.12.16.52 7.92.125.79 84.131.195.148