Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.245.63.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61535
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;2.245.63.48.			IN	A

;; AUTHORITY SECTION:
.			527	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022122901 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Dec 30 02:42:16 CST 2022
;; MSG SIZE  rcvd: 104
Host info
48.63.245.2.in-addr.arpa domain name pointer dynamic-002-245-063-048.2.245.pool.telefonica.de.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
48.63.245.2.in-addr.arpa	name = dynamic-002-245-063-048.2.245.pool.telefonica.de.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
207.148.102.16 attackspambots
[portscan] Port scan
2019-10-27 01:00:21
174.138.19.114 attack
$f2bV_matches
2019-10-27 00:55:08
179.83.38.46 attack
xmlrpc attack
2019-10-27 00:57:23
212.112.108.98 attackbots
Invalid user ruben from 212.112.108.98 port 44946
2019-10-27 01:10:35
198.143.179.155 attackspambots
Invalid user postgres from 198.143.179.155 port 36160
2019-10-27 01:11:18
101.255.118.53 attackspam
Oct 26 17:34:42 cvbnet sshd[25142]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.255.118.53 
Oct 26 17:34:44 cvbnet sshd[25142]: Failed password for invalid user ubuntu from 101.255.118.53 port 36946 ssh2
...
2019-10-27 00:40:07
105.247.57.55 attackbotsspam
Telnetd brute force attack detected by fail2ban
2019-10-27 00:38:49
61.177.172.128 attack
22/tcp 22/tcp 22/tcp...
[2019-08-25/10-26]367pkt,1pt.(tcp)
2019-10-27 00:58:07
160.153.244.195 attack
Oct 26 19:00:08 xeon sshd[36474]: Failed password for invalid user smtpuser from 160.153.244.195 port 51412 ssh2
2019-10-27 01:06:03
204.111.241.83 attack
Invalid user pi from 204.111.241.83 port 37346
2019-10-27 00:32:33
51.91.193.116 attack
Oct 26 15:22:33 ns41 sshd[14732]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.193.116
2019-10-27 00:42:31
118.25.143.199 attack
Oct 26 18:02:17 xeon sshd[31394]: Failed password for root from 118.25.143.199 port 55740 ssh2
2019-10-27 00:59:03
202.79.26.106 attackspam
Invalid user guest from 202.79.26.106 port 60829
2019-10-27 00:43:11
185.193.26.155 attackspambots
Unauthorized connection attempt from IP address 185.193.26.155 on Port 445(SMB)
2019-10-27 00:44:05
139.59.57.64 attack
WordPress wp-login brute force :: 139.59.57.64 0.136 BYPASS [26/Oct/2019:23:37:49  1100] [censored_1] "POST /wp-login.php HTTP/1.1" 200 3770 "-" "Mozilla/5.0 (X11; Ubuntu; Linux x86_64; rv:62.0) Gecko/20100101 Firefox/62.0"
2019-10-27 00:46:48

Recently Reported IPs

200.59.9.179 185.13.228.153 182.89.179.64 182.44.205.82
172.8.219.237 172.208.52.224 165.113.183.237 51.89.10.254
164.63.223.5 160.116.124.31 153.21.235.61 148.30.2.221
142.112.36.109 139.248.173.4 139.122.23.245 132.78.196.220
13.41.185.165 125.145.86.125 119.183.241.117 112.102.112.191