Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Canada

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 140.165.48.112
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 43430
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;140.165.48.112.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 05:59:43 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 112.48.165.140.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 112.48.165.140.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
3.12.45.0 attack
Unauthorized connection attempt detected from IP address 3.12.45.0 to port 2220 [J]
2020-01-27 21:46:11
145.239.91.88 attackbotsspam
Invalid user ym from 145.239.91.88 port 47142
2020-01-27 21:49:46
93.118.181.123 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-27 21:49:07
210.212.233.34 attack
2020-01-27T13:14:49.796190shield sshd\[10675\]: Invalid user comercial from 210.212.233.34 port 51492
2020-01-27T13:14:49.802674shield sshd\[10675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.233.34
2020-01-27T13:14:51.581439shield sshd\[10675\]: Failed password for invalid user comercial from 210.212.233.34 port 51492 ssh2
2020-01-27T13:17:47.842468shield sshd\[11883\]: Invalid user ts3 from 210.212.233.34 port 48780
2020-01-27T13:17:47.845843shield sshd\[11883\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=210.212.233.34
2020-01-27 21:19:04
191.176.234.152 attack
$f2bV_matches
2020-01-27 21:50:29
3.125.89.239 attackbotsspam
Unauthorized connection attempt detected from IP address 3.125.89.239 to port 2220 [J]
2020-01-27 21:27:12
5.153.132.102 attackspambots
Invalid user steve from 5.153.132.102 port 38886
2020-01-27 21:37:40
176.43.89.120 attack
DATE:2020-01-27 10:53:06, IP:176.43.89.120, PORT:telnet Telnet brute force auth on honeypot server (epe-honey1-hq)
2020-01-27 21:53:43
122.51.36.240 attackspambots
SSH Login Bruteforce
2020-01-27 21:42:42
90.84.229.205 attack
Honeypot attack, port: 81, PTR: 90-84-229-205.orangero.net.
2020-01-27 21:45:12
223.206.232.17 attackbots
1580118861 - 01/27/2020 10:54:21 Host: 223.206.232.17/223.206.232.17 Port: 445 TCP Blocked
2020-01-27 21:14:43
66.183.185.129 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-27 21:23:12
66.209.97.86 attack
Unauthorized connection attempt detected from IP address 66.209.97.86 to port 88 [J]
2020-01-27 21:43:10
137.97.134.225 attackbotsspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-27 21:22:54
138.197.89.212 attack
Automatic report - Banned IP Access
2020-01-27 21:31:50

Recently Reported IPs

19.165.218.39 240.43.230.33 221.157.15.73 25.230.146.47
227.141.157.73 103.213.142.174 52.113.33.12 3.127.140.25
248.19.236.73 86.226.148.169 74.84.48.17 84.36.212.195
230.202.6.78 150.73.46.156 135.52.19.217 55.9.176.152
36.238.171.208 221.202.176.239 101.226.204.233 240.191.192.54