Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 145.96.71.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 55750
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;145.96.71.48.			IN	A

;; AUTHORITY SECTION:
.			502	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019121101 1800 900 604800 86400

;; Query time: 53 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Dec 12 13:13:01 CST 2019
;; MSG SIZE  rcvd: 116
Host info
48.71.96.145.in-addr.arpa domain name pointer host-48-71.eduroamers.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.71.96.145.in-addr.arpa	name = host-48-71.eduroamers.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
49.146.40.183 attackspam
20/1/31@06:16:07: FAIL: Alarm-Network address from=49.146.40.183
...
2020-01-31 23:12:03
182.61.184.244 attackbotsspam
Unauthorized connection attempt detected from IP address 182.61.184.244 to port 445
2020-01-31 23:10:34
157.230.249.58 attackspambots
157.230.249.58 - - [31/Jan/2020:15:28:04 +0000] "POST /wp-login.php HTTP/1.1" 200 6409 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
157.230.249.58 - - [31/Jan/2020:15:28:05 +0000] "POST /xmlrpc.php HTTP/1.1" 200 403 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
...
2020-01-31 23:34:16
218.92.0.165 attack
Jan 31 10:26:23 plusreed sshd[18868]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.165  user=root
Jan 31 10:26:25 plusreed sshd[18868]: Failed password for root from 218.92.0.165 port 52108 ssh2
...
2020-01-31 23:33:51
81.22.45.133 attackspam
ET CINS Active Threat Intelligence Poor Reputation IP group 79 - port: 37165 proto: TCP cat: Misc Attack
2020-01-31 23:06:27
1.179.185.50 attackspam
Invalid user info from 1.179.185.50 port 32926
2020-01-31 23:26:10
114.113.126.163 attackspambots
Unauthorized connection attempt detected from IP address 114.113.126.163 to port 2220 [J]
2020-01-31 23:29:11
200.151.208.132 attack
$f2bV_matches
2020-01-31 23:04:41
106.12.33.50 attackbotsspam
SSH invalid-user multiple login attempts
2020-01-31 23:19:55
159.65.158.30 attackbotsspam
Invalid user saradasri from 159.65.158.30 port 40474
2020-01-31 23:32:51
2602:306:bc7b:14a0:c988:7670:2c4d:91e8 attack
Malicious/Probing: /wp-login.php
2020-01-31 23:23:09
85.209.150.237 attack
85.209.150.237 - - [31/Jan/2020:09:43:14 +0100] "GET /awstats.pl?framename=mainright&output=refererpages HTTP/1.0" 404 280 "-" "Mozilla/5.0 (Windows NT 5.1; rv:2.0.1) Gecko/20100101 Firefox/4.0.1 PCNBrowser/4.0.52"
2020-01-31 23:05:53
177.239.0.168 attackspambots
TCP Port Scanning
2020-01-31 23:24:16
49.35.67.1 attackbotsspam
20/1/31@03:43:01: FAIL: Alarm-Network address from=49.35.67.1
...
2020-01-31 23:13:26
209.17.97.26 attackspam
Automatic report - Banned IP Access
2020-01-31 22:54:02

Recently Reported IPs

28.48.219.49 45.253.244.72 136.159.249.132 47.67.79.176
90.107.160.22 61.153.80.245 166.37.195.86 190.146.208.174
155.202.176.13 55.65.85.212 48.7.197.69 63.100.186.118
172.246.86.105 120.127.155.93 54.110.237.191 84.138.253.53
50.2.5.11 92.62.131.124 184.144.239.165 115.4.141.158