Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
112.48.22.52 attackbots
Port probing on unauthorized port 23
2020-10-10 02:19:00
112.48.22.52 attack
Port probing on unauthorized port 23
2020-10-09 18:03:50
112.48.23.98 attack
Unauthorized connection attempt detected from IP address 112.48.23.98 to port 1433 [J]
2020-01-19 19:09:57
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.48.2.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 34183
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.48.2.145.			IN	A

;; AUTHORITY SECTION:
.			160	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022031100 1800 900 604800 86400

;; Query time: 56 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 12 00:29:38 CST 2022
;; MSG SIZE  rcvd: 105
Host info
b'Host 145.2.48.112.in-addr.arpa not found: 2(SERVFAIL)
'
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 145.2.48.112.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
73.6.13.91 attackspam
Invalid user service from 73.6.13.91 port 58117
2020-04-12 13:34:13
69.158.207.141 attackspam
20/4/12@01:19:40: FAIL: IoT-SSH address from=69.158.207.141
...
2020-04-12 13:31:26
192.3.139.56 attack
Apr 12 06:58:42 meumeu sshd[5984]: Failed password for root from 192.3.139.56 port 33848 ssh2
Apr 12 07:02:21 meumeu sshd[6908]: Failed password for root from 192.3.139.56 port 41544 ssh2
...
2020-04-12 13:19:29
122.51.39.242 attack
Apr 12 05:53:04 meumeu sshd[21826]: Failed password for root from 122.51.39.242 port 37918 ssh2
Apr 12 05:54:48 meumeu sshd[22126]: Failed password for root from 122.51.39.242 port 57976 ssh2
...
2020-04-12 13:54:07
49.233.142.45 attack
Port scan detected on ports: 1433[TCP], 1433[TCP], 1433[TCP]
2020-04-12 13:23:06
160.19.136.83 attack
Unauthorised access (Apr 12) SRC=160.19.136.83 LEN=52 TTL=113 ID=12594 DF TCP DPT=445 WINDOW=8192 SYN
2020-04-12 13:41:55
141.98.81.138 attackbotsspam
Apr 12 05:56:52 debian64 sshd[17333]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=141.98.81.138 
Apr 12 05:56:54 debian64 sshd[17333]: Failed password for invalid user admin from 141.98.81.138 port 61298 ssh2
...
2020-04-12 13:38:40
14.18.107.61 attack
Invalid user odoo from 14.18.107.61 port 38886
2020-04-12 13:32:42
183.160.213.68 attackbots
Apr 12 05:52:00 prod4 sshd\[23571\]: Failed password for root from 183.160.213.68 port 30151 ssh2
Apr 12 05:56:57 prod4 sshd\[24624\]: Failed password for root from 183.160.213.68 port 33723 ssh2
Apr 12 06:01:50 prod4 sshd\[26444\]: Invalid user su from 183.160.213.68
...
2020-04-12 13:46:00
119.29.227.108 attackbots
Apr 12 00:57:12 firewall sshd[17019]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=119.29.227.108
Apr 12 00:57:12 firewall sshd[17019]: Invalid user alistair from 119.29.227.108
Apr 12 00:57:14 firewall sshd[17019]: Failed password for invalid user alistair from 119.29.227.108 port 34622 ssh2
...
2020-04-12 13:25:55
66.42.114.152 attackbotsspam
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/66.42.114.152/ 
 
 US - 1H : (16)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : US 
 NAME ASN : ASN20473 
 
 IP : 66.42.114.152 
 
 CIDR : 66.42.112.0/20 
 
 PREFIX COUNT : 584 
 
 UNIQUE IP COUNT : 939776 
 
 
 ATTACKS DETECTED ASN20473 :  
  1H - 3 
  3H - 5 
  6H - 5 
 12H - 5 
 24H - 5 
 
 DateTime : 2020-04-12 05:56:39 
 
 INFO : DNS DENIED Scan Detected and Blocked by ADMIN  - data recovery
2020-04-12 13:50:35
101.230.236.177 attack
Invalid user postgres from 101.230.236.177 port 34038
2020-04-12 13:28:31
152.32.187.51 attackbots
Invalid user user from 152.32.187.51 port 38792
2020-04-12 13:56:29
82.79.235.93 attackbots
Unauthorized access detected from black listed ip!
2020-04-12 13:51:29
45.141.87.20 attack
RDP Bruteforce
2020-04-12 13:56:57

Recently Reported IPs

112.47.58.180 112.48.28.144 112.48.48.101 112.48.56.238
112.48.67.72 112.49.131.50 112.49.151.19 112.49.184.109
112.49.191.73 112.49.220.15 96.245.53.150 112.66.108.255
112.66.108.29 112.66.108.41 112.66.108.53 112.66.108.63
112.66.109.100 112.66.109.127 112.66.109.182 112.66.109.212