Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
103.145.34.2 attackbotsspam
Unauthorized connection attempt from IP address 103.145.34.2 on Port 445(SMB)
2020-04-14 20:22:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 103.145.34.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 50737
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;103.145.34.48.			IN	A

;; AUTHORITY SECTION:
.			239	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022500 1800 900 604800 86400

;; Query time: 19 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 25 16:42:02 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 48.34.145.103.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.34.145.103.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
192.241.225.136 attackbotsspam
Icarus honeypot on github
2020-06-24 02:36:47
38.69.137.217 attackspam
Scanned 275 unique addresses for 2 unique TCP ports in 24 hours (ports 9525,18017)
2020-06-24 02:50:43
158.69.138.27 attackbots
Unauthorized connection attempt detected from IP address 158.69.138.27 to port 8888
2020-06-24 02:24:04
101.51.144.235 attackbotsspam
Unauthorized connection attempt detected from IP address 101.51.144.235 to port 445 [T]
2020-06-24 02:43:56
51.83.69.84 attackspam
Automatic report - Banned IP Access
2020-06-24 02:48:37
118.70.190.137 attack
Unauthorized connection attempt detected from IP address 118.70.190.137 to port 80 [T]
2020-06-24 02:25:18
222.186.31.166 attack
Jun 23 20:34:30 piServer sshd[7912]: Failed password for root from 222.186.31.166 port 63648 ssh2
Jun 23 20:34:34 piServer sshd[7912]: Failed password for root from 222.186.31.166 port 63648 ssh2
Jun 23 20:34:37 piServer sshd[7912]: Failed password for root from 222.186.31.166 port 63648 ssh2
...
2020-06-24 02:35:08
113.175.118.70 attackspambots
Unauthorized connection attempt detected from IP address 113.175.118.70 to port 445 [T]
2020-06-24 02:26:39
34.92.7.161 attackspambots
1592935547 - 06/24/2020 01:05:47 Host: 161.7.92.34.bc.googleusercontent.com/34.92.7.161 Port: 23 TCP Blocked
...
2020-06-24 02:50:58
192.241.224.136 attack
 TCP (SYN) 192.241.224.136:55647 -> port 143, len 40
2020-06-24 02:53:48
162.62.16.194 attackbotsspam
Unauthorized connection attempt detected from IP address 162.62.16.194 to port 9009 [T]
2020-06-24 02:23:36
145.255.11.44 attack
Unauthorized connection attempt detected from IP address 145.255.11.44 to port 5900 [T]
2020-06-24 02:56:57
84.51.213.118 attack
Unauthorized connection attempt detected from IP address 84.51.213.118 to port 445 [T]
2020-06-24 02:47:04
173.230.151.25 attack
Scanned 331 unique addresses for 2 unique TCP ports in 24 hours (ports 6099,23797)
2020-06-24 02:39:58
117.4.163.246 attackbots
Unauthorized connection attempt detected from IP address 117.4.163.246 to port 445 [T]
2020-06-24 02:25:35

Recently Reported IPs

103.145.34.9 103.145.34.51 103.145.34.58 103.145.35.114
103.145.35.34 103.145.44.156 103.145.38.153 1.20.99.13
103.145.45.125 103.145.44.28 103.145.45.105 103.145.45.13
103.145.45.129 103.145.45.133 103.145.45.153 103.145.45.161
103.145.45.166 103.145.44.21 103.145.45.149 1.20.99.130