Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.225.48.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 16077
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.225.48.12.			IN	A

;; AUTHORITY SECTION:
.			523	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024090701 1800 900 604800 86400

;; Query time: 47 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sun Sep 08 04:13:19 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 12.48.225.112.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
server can't find 112.225.48.12.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
190.52.131.234 attack
Jun  8 11:39:08 game-panel sshd[10837]: Failed password for root from 190.52.131.234 port 44162 ssh2
Jun  8 11:41:42 game-panel sshd[11071]: Failed password for root from 190.52.131.234 port 50294 ssh2
2020-06-08 19:49:01
175.6.35.46 attackspam
Jun  8 08:42:24 gw1 sshd[29976]: Failed password for root from 175.6.35.46 port 46802 ssh2
...
2020-06-08 19:55:43
111.230.180.65 attack
Jun  8 07:08:08 PorscheCustomer sshd[7840]: Failed password for root from 111.230.180.65 port 44308 ssh2
Jun  8 07:10:12 PorscheCustomer sshd[7931]: Failed password for root from 111.230.180.65 port 40088 ssh2
...
2020-06-08 20:02:23
46.229.168.141 attackspambots
Trolling for resource vulnerabilities
2020-06-08 19:24:25
101.51.28.181 attackspambots
Unauthorized connection attempt from IP address 101.51.28.181 on Port 445(SMB)
2020-06-08 19:48:47
125.224.174.226 attackbots
Unauthorized connection attempt from IP address 125.224.174.226 on Port 445(SMB)
2020-06-08 20:05:50
148.70.183.250 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-06-08 19:35:11
106.12.74.23 attackspambots
$f2bV_matches
2020-06-08 19:36:09
103.10.87.54 attackspambots
SSH/22 MH Probe, BF, Hack -
2020-06-08 19:23:03
68.183.183.21 attack
Jun  8 12:58:20 PorscheCustomer sshd[19955]: Failed password for root from 68.183.183.21 port 39648 ssh2
Jun  8 13:02:05 PorscheCustomer sshd[20062]: Failed password for root from 68.183.183.21 port 40498 ssh2
...
2020-06-08 20:04:56
49.151.227.81 attackspam
Honeypot attack, port: 445, PTR: dsl.49.151.227.81.pldt.net.
2020-06-08 19:57:50
133.130.89.210 attackspambots
Jun  8 08:51:13 journals sshd\[85271\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.210  user=root
Jun  8 08:51:15 journals sshd\[85271\]: Failed password for root from 133.130.89.210 port 46238 ssh2
Jun  8 08:55:01 journals sshd\[85736\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.210  user=root
Jun  8 08:55:03 journals sshd\[85736\]: Failed password for root from 133.130.89.210 port 49378 ssh2
Jun  8 08:58:57 journals sshd\[86208\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=133.130.89.210  user=root
...
2020-06-08 19:51:28
121.202.67.22 attackbots
scan z
2020-06-08 19:43:21
180.250.89.214 attackbotsspam
Icarus honeypot on github
2020-06-08 20:03:48
185.153.79.14 attack
" "
2020-06-08 20:01:50

Recently Reported IPs

112.225.92.249 112.225.53.94 112.225.50.162 112.225.43.105
112.225.67.181 112.225.38.250 112.225.84.217 112.225.79.37
112.228.36.99 112.225.3.214 112.225.231.158 112.225.248.95
112.225.230.34 112.225.239.244 112.225.242.84 112.225.25.17
112.227.3.78 112.225.46.162 112.225.194.106 112.225.185.173