Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 113.53.48.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 39622
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;113.53.48.145.			IN	A

;; AUTHORITY SECTION:
.			502	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022030400 1800 900 604800 86400

;; Query time: 30 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Mar 04 13:56:39 CST 2022
;; MSG SIZE  rcvd: 106
Host info
145.48.53.113.in-addr.arpa domain name pointer node-9ld.pool-113-53.dynamic.totinternet.net.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
145.48.53.113.in-addr.arpa	name = node-9ld.pool-113-53.dynamic.totinternet.net.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
86.135.203.194 attack
Invalid user postgres from 86.135.203.194 port 27432
2020-04-20 23:18:07
51.83.73.115 attackspam
Tried sshing with brute force.
2020-04-20 23:26:55
112.213.121.230 attackspambots
Invalid user tw from 112.213.121.230 port 47244
2020-04-20 23:07:40
62.210.219.124 attackbotsspam
SSH login attempts.
2020-04-20 23:23:55
24.72.212.241 attackbotsspam
Invalid user pm from 24.72.212.241 port 59968
2020-04-20 23:37:23
94.72.87.171 attackspam
Apr 20 21:48:23 f sshd\[19418\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.72.87.171
Apr 20 21:48:23 f sshd\[19419\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=94.72.87.171
Apr 20 21:48:25 f sshd\[19418\]: Failed password for invalid user pi from 94.72.87.171 port 54288 ssh2
...
2020-04-20 23:16:47
113.162.155.213 attack
Invalid user admin from 113.162.155.213 port 56655
2020-04-20 23:06:24
101.89.197.232 attackbots
$f2bV_matches
2020-04-20 23:15:18
51.75.140.153 attack
$f2bV_matches
2020-04-20 23:27:44
84.147.220.84 attackspambots
Invalid user fk from 84.147.220.84 port 44416
2020-04-20 23:19:01
114.67.66.199 attackspambots
Invalid user test03 from 114.67.66.199 port 41548
2020-04-20 23:06:01
51.254.32.102 attackspam
Invalid user dr from 51.254.32.102 port 42206
2020-04-20 23:26:10
221.229.196.134 attackbots
Apr 20 17:00:56 odroid64 sshd\[19853\]: Invalid user cpsrvsid from 221.229.196.134
Apr 20 17:00:56 odroid64 sshd\[19853\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=221.229.196.134
...
2020-04-20 23:42:50
64.202.185.161 attackbots
SSH login attempts.
2020-04-20 23:23:00
103.91.53.30 attack
Brute force attempt
2020-04-20 23:13:32

Recently Reported IPs

113.53.48.104 113.53.47.72 113.53.48.150 113.53.48.119
113.53.47.69 113.53.48.13 113.22.89.231 113.53.47.79
113.53.47.93 113.53.48.113 113.53.48.156 113.53.48.154
113.53.48.17 113.53.48.183 113.53.48.196 113.53.48.192
113.53.48.18 113.53.48.208 113.53.48.20 113.53.48.232