Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Lake Worth

Region: Florida

Country: United States

Internet Service Provider: AT&T

Hostname: unknown

Organization: AT&T Services, Inc.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 104.12.48.122
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 24185
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;104.12.48.122.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019073002 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Wed Jul 31 02:57:26 CST 2019
;; MSG SIZE  rcvd: 117
Host info
122.48.12.104.in-addr.arpa domain name pointer 104-12-48-122.lightspeed.wepbfl.sbcglobal.net.
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

Non-authoritative answer:
122.48.12.104.in-addr.arpa	name = 104-12-48-122.lightspeed.wepbfl.sbcglobal.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
14.198.221.148 attack
Invalid user admin from 14.198.221.148 port 57948
2020-08-26 04:03:11
107.170.178.103 attack
$f2bV_matches
2020-08-26 03:49:57
200.93.149.162 attack
Unauthorized connection attempt from IP address 200.93.149.162 on Port 445(SMB)
2020-08-26 04:22:18
200.106.58.196 attack
Unauthorized connection attempt from IP address 200.106.58.196 on Port 445(SMB)
2020-08-26 04:24:59
115.28.186.105 attackbots
2020-08-26T03:02:06.051826hostname sshd[27973]: Invalid user sinus1 from 115.28.186.105 port 39172
...
2020-08-26 04:23:05
51.178.46.95 attackbotsspam
*Port Scan* detected from 51.178.46.95 (FR/France/Grand Est/Strasbourg/95.ip-51-178-46.eu). 4 hits in the last 105 seconds
2020-08-26 03:59:20
77.37.162.17 attackspam
SSH BruteForce Attack
2020-08-26 03:56:45
51.255.197.164 attack
Aug 25 06:07:27 serwer sshd\[9160\]: Invalid user larry from 51.255.197.164 port 44250
Aug 25 06:07:27 serwer sshd\[9160\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.255.197.164
Aug 25 06:07:28 serwer sshd\[9160\]: Failed password for invalid user larry from 51.255.197.164 port 44250 ssh2
...
2020-08-26 03:58:40
222.186.175.169 attackspam
Aug 25 20:02:19 scw-6657dc sshd[5401]: Failed password for root from 222.186.175.169 port 45850 ssh2
Aug 25 20:02:19 scw-6657dc sshd[5401]: Failed password for root from 222.186.175.169 port 45850 ssh2
Aug 25 20:02:22 scw-6657dc sshd[5401]: Failed password for root from 222.186.175.169 port 45850 ssh2
...
2020-08-26 04:04:42
115.231.65.34 attackspam
Unauthorized connection attempt from IP address 115.231.65.34 on Port 445(SMB)
2020-08-26 04:26:30
193.37.214.80 attackbotsspam
(mod_security) mod_security (id:218500) triggered by 193.37.214.80 (BG/Bulgaria/test221.vps-ag.com): 5 in the last 3600 secs
2020-08-26 04:22:40
27.65.110.16 attack
Invalid user admin from 27.65.110.16 port 45819
2020-08-26 04:02:45
218.92.0.185 attackbots
Fail2Ban Ban Triggered (2)
2020-08-26 04:08:01
45.125.65.112 attackbotsspam
Tried our host z.
2020-08-26 04:09:26
183.49.247.175 attackspambots
Email rejected due to spam filtering
2020-08-26 04:16:43

Recently Reported IPs

207.65.188.181 152.39.123.114 63.193.252.225 14.48.77.231
170.19.199.255 24.17.37.132 79.107.215.103 44.133.170.44
119.194.74.153 23.11.247.25 187.108.19.211 128.1.138.242
154.57.13.214 144.24.103.244 73.212.135.48 115.53.148.84
199.126.20.243 98.28.212.49 152.254.31.120 34.220.77.115