Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 116.203.113.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61453
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;116.203.113.48.			IN	A

;; AUTHORITY SECTION:
.			485	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022033100 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 31 19:00:00 CST 2022
;; MSG SIZE  rcvd: 107
Host info
48.113.203.116.in-addr.arpa domain name pointer static.48.113.203.116.clients.your-server.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.113.203.116.in-addr.arpa	name = static.48.113.203.116.clients.your-server.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.249.91.252 attackspam
[2020-08-27 02:39:24] NOTICE[1185][C-00007484] chan_sip.c: Call from '' (45.249.91.252:52027) to extension '01146423112947' rejected because extension not found in context 'public'.
[2020-08-27 02:39:24] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-27T02:39:24.827-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="01146423112947",SessionID="0x7f10c4286a78",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45.249.91.252/52027",ACLName="no_extension_match"
[2020-08-27 02:41:17] NOTICE[1185][C-00007486] chan_sip.c: Call from '' (45.249.91.252:64578) to extension '901146423112947' rejected because extension not found in context 'public'.
[2020-08-27 02:41:17] SECURITY[1203] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-08-27T02:41:17.986-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="901146423112947",SessionID="0x7f10c43e3a48",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/45
...
2020-08-27 16:40:50
198.100.149.77 attack
Attempt to hack Wordpress Login, XMLRPC or other login
2020-08-27 17:10:53
103.123.66.98 attackbots
Unauthorized connection attempt from IP address 103.123.66.98 on Port 445(SMB)
2020-08-27 16:47:40
189.58.118.253 attack
Attempted connection to port 445.
2020-08-27 17:23:09
117.4.163.196 attackspambots
Unauthorized connection attempt from IP address 117.4.163.196 on Port 445(SMB)
2020-08-27 16:47:11
220.88.220.86 attack
Fail2Ban Ban Triggered
2020-08-27 17:19:57
41.236.192.157 attackspambots
Attempted connection to port 5501.
2020-08-27 17:21:03
14.190.202.26 attackbots
Brute forcing RDP port 3389
2020-08-27 16:48:43
115.73.189.130 attackspam
Unauthorized connection attempt from IP address 115.73.189.130 on Port 445(SMB)
2020-08-27 16:49:29
116.109.111.98 attackspambots
Unauthorized connection attempt from IP address 116.109.111.98 on Port 445(SMB)
2020-08-27 16:51:02
108.161.168.67 attack
Aug 25 15:55:26 host2 sshd[10082]: reveeclipse mapping checking getaddrinfo for cpec0ffd49e2e7c-cm0022102d165a.tpia.videotron.ca [108.161.168.67] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 25 15:55:26 host2 sshd[10082]: Invalid user admin from 108.161.168.67
Aug 25 15:55:26 host2 sshd[10082]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=108.161.168.67 
Aug 25 15:55:28 host2 sshd[10082]: Failed password for invalid user admin from 108.161.168.67 port 45363 ssh2
Aug 25 15:55:28 host2 sshd[10082]: Received disconnect from 108.161.168.67: 11: Bye Bye [preauth]
Aug 25 15:55:29 host2 sshd[10228]: reveeclipse mapping checking getaddrinfo for cpec0ffd49e2e7c-cm0022102d165a.tpia.videotron.ca [108.161.168.67] failed - POSSIBLE BREAK-IN ATTEMPT!
Aug 25 15:55:29 host2 sshd[10228]: Invalid user admin from 108.161.168.67
Aug 25 15:55:29 host2 sshd[10228]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=10........
-------------------------------
2020-08-27 16:34:30
103.130.184.174 attackspambots
Unauthorized connection attempt from IP address 103.130.184.174 on Port 445(SMB)
2020-08-27 17:15:14
36.65.176.41 attack
Attempted connection to port 445.
2020-08-27 17:24:18
202.86.173.170 attackspambots
Unauthorized connection attempt from IP address 202.86.173.170 on Port 445(SMB)
2020-08-27 16:59:38
108.162.28.6 attack
2020-08-26 23:56 Unauthorized connection attempt to IMAP/POP
2020-08-27 17:09:15

Recently Reported IPs

116.203.113.217 116.203.114.191 116.203.114.239 116.203.115.135
116.203.115.241 116.203.115.58 116.203.115.6 116.203.116.187
116.203.116.8 116.203.117.108 116.203.117.114 116.203.117.193
116.203.117.28 116.203.118.120 116.203.118.14 116.203.118.44
116.203.119.131 116.203.119.218 116.203.119.59 116.203.119.94