Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Hong Kong

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.12.48.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 25565
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.12.48.45.			IN	A

;; AUTHORITY SECTION:
.			363	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030300 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 03 23:51:11 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 45.48.12.103.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 103.12.48.45.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
185.176.27.110 attackspambots
11/29/2019-13:44:13.179596 185.176.27.110 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-30 03:20:09
185.53.88.6 attack
SIPVicious Scanner Detection
2019-11-30 03:09:17
184.105.247.204 attackspam
3389/tcp 50075/tcp 11211/tcp...
[2019-09-29/11-28]47pkt,16pt.(tcp),1pt.(udp)
2019-11-30 03:44:26
61.238.198.31 attack
port scan/probe/communication attempt
2019-11-30 03:08:34
27.185.1.10 attackbots
Portscan or hack attempt detected by psad/fwsnort
2019-11-30 03:05:06
185.209.0.91 attackspam
11/29/2019-19:53:10.290997 185.209.0.91 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2019-11-30 03:15:12
185.171.1.197 attackbots
185.171.1.197 - - [29/Nov/2019:17:00:11 +0200] "GET /index.php HTTP/1.1" 444 0 "-" "-"
2019-11-30 03:28:12
51.75.66.11 attack
Nov 29 16:01:17 MainVPS sshd[15904]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.11  user=root
Nov 29 16:01:19 MainVPS sshd[15904]: Failed password for root from 51.75.66.11 port 47546 ssh2
Nov 29 16:04:53 MainVPS sshd[22264]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.66.11  user=root
Nov 29 16:04:56 MainVPS sshd[22264]: Failed password for root from 51.75.66.11 port 54390 ssh2
Nov 29 16:08:31 MainVPS sshd[29032]: Invalid user kidoguchi from 51.75.66.11 port 33002
...
2019-11-30 03:41:36
134.209.90.220 attack
2019-11-06T23:31:35.218024suse-nuc sshd[12201]: Invalid user oj from 134.209.90.220 port 35854
...
2019-11-30 03:24:00
39.52.0.62 attackbots
PHI,WP GET /wp-login.php
2019-11-30 03:06:04
65.30.69.110 attackbotsspam
11/29/2019-19:46:06.797563 65.30.69.110 Protocol: 6 ET SCAN Suspicious inbound to MSSQL port 1433
2019-11-30 03:17:39
23.94.81.50 attackspam
23.94.81.50 has been banned for [WebApp Attack]
...
2019-11-30 03:41:54
179.180.154.66 attackspam
Automatic report - Port Scan Attack
2019-11-30 03:45:26
45.32.45.107 attackspambots
[FriNov2916:09:14.6218082019][:error][pid13622:tid47011297191680][client45.32.45.107:55638][client45.32.45.107]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(\^w3c-\|systran\\\\\\\\\)\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"233"][id"331039"][rev"1"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(Python-urllib\).DisablethisruleifyouusePython-urllib."][severity"CRITICAL"][hostname"giocheriamagic.ch"][uri"/wp-login.php"][unique_id"XeE0mjK5czkRv4JFpcsl3gAAAQE"][FriNov2916:09:17.9703222019][:error][pid13687:tid47011397158656][client45.32.45.107:55936][client45.32.45.107]ModSecurity:Accessdeniedwithcode403\(phase2\).Matchof"rx\(\^w3c-\|systran\\\\\\\\\)\)"against"REQUEST_HEADERS:User-Agent"required.[file"/usr/local/apache.ea3/conf/modsec_rules/20_asl_useragents.conf"][line"233"][id"331039"][rev"1"][msg"Atomicorp.comWAFRules:SuspiciousUnusualUserAgent\(Python-urllib\).Disablethisrule
2019-11-30 03:11:38
106.12.98.12 attack
fail2ban
2019-11-30 03:32:22

Recently Reported IPs

103.12.48.233 103.12.84.7 103.120.113.210 103.120.152.99
103.120.201.130 103.120.222.87 103.120.237.18 85.214.85.206
103.120.36.233 103.120.39.33 103.120.4.178 103.120.81.237
103.121.105.6 57.217.57.52 103.121.154.197 103.121.18.72
103.121.204.70 103.121.208.102 103.121.208.179 103.121.22.98