Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 112.48.80.237
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13976
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;112.48.80.237.			IN	A

;; AUTHORITY SECTION:
.			598	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022040103 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Apr 02 02:32:56 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 237.80.48.112.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 237.80.48.112.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
192.226.250.178 attackspam
2020-08-07 00:15:06 server sshd[563]: Failed password for invalid user root from 192.226.250.178 port 33334 ssh2
2020-08-09 01:28:00
106.13.167.62 attack
SSH Brute-Force attacks
2020-08-09 01:41:59
138.68.40.92 attackspam
 TCP (SYN) 138.68.40.92:45290 -> port 19006, len 44
2020-08-09 01:23:15
20.52.37.143 attackbotsspam
Aug  8 17:55:27 vpn01 sshd[31953]: Failed password for root from 20.52.37.143 port 47329 ssh2
...
2020-08-09 01:58:24
37.49.229.207 attackbots
[2020-08-08 08:02:02] NOTICE[1248][C-00004d6e] chan_sip.c: Call from '' (37.49.229.207:7069) to extension '01148323395006' rejected because extension not found in context 'public'.
[2020-08-08 08:02:02] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-08T08:02:02.441-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01148323395006",SessionID="0x7f27203df9b8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49.229.207/7069",ACLName="no_extension_match"
[2020-08-08 08:11:44] NOTICE[1248][C-00004d75] chan_sip.c: Call from '' (37.49.229.207:9255) to extension '901148323395006' rejected because extension not found in context 'public'.
[2020-08-08 08:11:44] SECURITY[1275] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-08T08:11:44.490-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901148323395006",SessionID="0x7f27204f0348",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/37.49
...
2020-08-09 01:59:48
185.200.118.90 attack
scans once in preceeding hours on the ports (in chronological order) 1723 resulting in total of 2 scans from 185.200.118.0/24 block.
2020-08-09 01:39:20
62.234.137.128 attack
Aug  8 19:36:13 h2779839 sshd[11443]: Invalid user Win*2008 from 62.234.137.128 port 45880
Aug  8 19:36:13 h2779839 sshd[11443]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.137.128
Aug  8 19:36:13 h2779839 sshd[11443]: Invalid user Win*2008 from 62.234.137.128 port 45880
Aug  8 19:36:14 h2779839 sshd[11443]: Failed password for invalid user Win*2008 from 62.234.137.128 port 45880 ssh2
Aug  8 19:40:06 h2779839 sshd[11511]: Invalid user 12121212 from 62.234.137.128 port 34480
Aug  8 19:40:06 h2779839 sshd[11511]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=62.234.137.128
Aug  8 19:40:06 h2779839 sshd[11511]: Invalid user 12121212 from 62.234.137.128 port 34480
Aug  8 19:40:08 h2779839 sshd[11511]: Failed password for invalid user 12121212 from 62.234.137.128 port 34480 ssh2
Aug  8 19:43:49 h2779839 sshd[11534]: Invalid user 123123.0+ from 62.234.137.128 port 51284
...
2020-08-09 01:51:40
182.253.22.2 attackbots
Aug  8 16:05:42 h2779839 sshd[8542]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.22.2  user=root
Aug  8 16:05:44 h2779839 sshd[8542]: Failed password for root from 182.253.22.2 port 54752 ssh2
Aug  8 16:06:55 h2779839 sshd[8562]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.22.2  user=root
Aug  8 16:06:57 h2779839 sshd[8562]: Failed password for root from 182.253.22.2 port 42474 ssh2
Aug  8 16:08:11 h2779839 sshd[8587]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.22.2  user=root
Aug  8 16:08:13 h2779839 sshd[8587]: Failed password for root from 182.253.22.2 port 58420 ssh2
Aug  8 16:09:29 h2779839 sshd[8634]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.253.22.2  user=root
Aug  8 16:09:31 h2779839 sshd[8634]: Failed password for root from 182.253.22.2 port 46150 ssh2
Aug  8 16:10:41 h277
...
2020-08-09 01:25:03
106.13.228.13 attackbotsspam
Aug  8 13:28:11 localhost sshd[55118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.228.13  user=root
Aug  8 13:28:13 localhost sshd[55118]: Failed password for root from 106.13.228.13 port 36706 ssh2
Aug  8 13:32:31 localhost sshd[55508]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.228.13  user=root
Aug  8 13:32:33 localhost sshd[55508]: Failed password for root from 106.13.228.13 port 47556 ssh2
Aug  8 13:36:34 localhost sshd[55952]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.228.13  user=root
Aug  8 13:36:35 localhost sshd[55952]: Failed password for root from 106.13.228.13 port 58378 ssh2
...
2020-08-09 01:38:46
118.25.109.46 attack
2020-08-08T14:07:46.399513mail.broermann.family sshd[22827]: Failed password for root from 118.25.109.46 port 38402 ssh2
2020-08-08T14:09:59.900953mail.broermann.family sshd[22891]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.109.46  user=root
2020-08-08T14:10:02.395585mail.broermann.family sshd[22891]: Failed password for root from 118.25.109.46 port 59088 ssh2
2020-08-08T14:12:12.166633mail.broermann.family sshd[22975]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=118.25.109.46  user=root
2020-08-08T14:12:13.917631mail.broermann.family sshd[22975]: Failed password for root from 118.25.109.46 port 51542 ssh2
...
2020-08-09 01:40:47
207.46.13.142 attack
Automatic report - Banned IP Access
2020-08-09 01:52:14
81.170.239.2 attackspam
81.170.239.2 - - [08/Aug/2020:18:59:18 +0100] "POST /wp-login.php HTTP/1.1" 200 1861 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
81.170.239.2 - - [08/Aug/2020:18:59:18 +0100] "POST /wp-login.php HTTP/1.1" 200 1839 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
81.170.239.2 - - [08/Aug/2020:18:59:19 +0100] "POST /xmlrpc.php HTTP/1.1" 403 219 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-08-09 02:00:52
207.46.13.22 attackbotsspam
Automatic report - Banned IP Access
2020-08-09 02:03:46
111.229.167.91 attack
Aug  8 16:33:15 Ubuntu-1404-trusty-64-minimal sshd\[2952\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.167.91  user=root
Aug  8 16:33:16 Ubuntu-1404-trusty-64-minimal sshd\[2952\]: Failed password for root from 111.229.167.91 port 54652 ssh2
Aug  8 16:48:07 Ubuntu-1404-trusty-64-minimal sshd\[11039\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.167.91  user=root
Aug  8 16:48:09 Ubuntu-1404-trusty-64-minimal sshd\[11039\]: Failed password for root from 111.229.167.91 port 54684 ssh2
Aug  8 16:51:29 Ubuntu-1404-trusty-64-minimal sshd\[13085\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=111.229.167.91  user=root
2020-08-09 01:58:44
115.78.122.110 attackbots
Spam Timestamp : 08-Aug-20 12:13   BlockList Provider  truncate.gbudb.net   (45)
2020-08-09 02:01:20

Recently Reported IPs

112.48.67.84 112.49.137.71 112.49.146.55 112.49.153.117
54.215.176.142 112.49.178.225 112.49.219.9 112.49.232.0
112.49.233.225 112.49.235.198 112.49.238.116 112.49.254.125
161.234.126.200 112.49.76.202 112.49.76.212 112.49.92.137
112.49.95.25 112.5.194.195 112.5.206.4 112.5.37.136