Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Switzerland

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.243.48.65
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22214
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.243.48.65.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021400 1800 900 604800 86400

;; Query time: 13 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 17:32:13 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 65.48.243.212.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 65.48.243.212.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
88.121.22.235 attack
Unauthorized connection attempt detected from IP address 88.121.22.235 to port 2220 [J]
2020-01-26 02:18:50
88.247.155.60 attackbots
Unauthorized connection attempt detected from IP address 88.247.155.60 to port 23 [J]
2020-01-26 02:18:18
222.186.42.136 attack
Jan 25 18:37:34 debian64 sshd\[9511\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.42.136  user=root
Jan 25 18:37:36 debian64 sshd\[9511\]: Failed password for root from 222.186.42.136 port 41630 ssh2
Jan 25 18:37:38 debian64 sshd\[9511\]: Failed password for root from 222.186.42.136 port 41630 ssh2
...
2020-01-26 01:47:18
61.143.152.11 attackspam
Unauthorized connection attempt detected from IP address 61.143.152.11 to port 1433 [J]
2020-01-26 02:20:38
95.241.44.156 attackspam
Unauthorized connection attempt detected from IP address 95.241.44.156 to port 2220 [J]
2020-01-26 02:16:40
159.65.26.61 attackspam
Unauthorized connection attempt detected from IP address 159.65.26.61 to port 2220 [J]
2020-01-26 02:00:00
176.108.12.36 attackbots
Honeypot attack, port: 81, PTR: h-176-108-12-36.ktv.net.ua.
2020-01-26 01:54:31
198.211.110.133 attackbotsspam
Jan 25 16:11:44 hosting sshd[22826]: Invalid user guest from 198.211.110.133 port 50172
...
2020-01-26 01:50:56
223.247.140.89 attackbots
Scanned 6 times in the last 24 hours on port 22
2020-01-26 01:55:07
132.145.196.193 attackbots
Scanned 3 times in the last 24 hours on port 22
2020-01-26 02:10:08
104.251.37.225 attackspam
Unauthorized connection attempt detected from IP address 104.251.37.225 to port 5555 [J]
2020-01-26 01:48:40
122.114.128.91 attack
Unauthorized connection attempt detected from IP address 122.114.128.91 to port 1433 [J]
2020-01-26 02:01:01
173.186.175.146 attack
Unauthorized connection attempt detected from IP address 173.186.175.146 to port 23 [J]
2020-01-26 01:59:40
220.137.94.1 attack
Unauthorized connection attempt detected from IP address 220.137.94.1 to port 23 [J]
2020-01-26 01:56:01
144.12.59.16 attack
Unauthorised access (Jan 25) SRC=144.12.59.16 LEN=40 TTL=52 ID=33510 TCP DPT=23 WINDOW=23246 SYN
2020-01-26 01:51:59

Recently Reported IPs

95.232.199.46 197.69.16.58 174.84.146.35 135.143.163.216
37.129.83.187 37.116.112.45 216.179.158.184 41.83.123.158
152.156.172.82 141.185.10.202 45.146.251.164 5.20.121.44
131.145.136.7 85.49.66.51 228.120.14.142 239.89.88.99
43.17.31.190 189.114.8.134 119.110.130.48 74.87.181.164