Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Netherlands (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 212.45.48.204
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 27467
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;212.45.48.204.			IN	A

;; AUTHORITY SECTION:
.			458	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023053102 1800 900 604800 86400

;; Query time: 71 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Jun 01 07:51:07 CST 2023
;; MSG SIZE  rcvd: 106
Host info
204.48.45.212.in-addr.arpa domain name pointer dsl-48204.solcon.nl.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
204.48.45.212.in-addr.arpa	name = dsl-48204.solcon.nl.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.41.139.134 attackbots
Sep 15 01:54:29 xeon sshd[30759]: Failed password for root from 46.41.139.134 port 45512 ssh2
2020-09-15 12:45:24
190.81.175.66 attackbots
Repeated RDP login failures. Last user: Brian
2020-09-15 13:05:38
186.113.18.109 attackspambots
2020-09-14T19:11:27.381141server.mjenks.net sshd[1224609]: Failed password for invalid user faxul from 186.113.18.109 port 48698 ssh2
2020-09-14T19:15:35.875808server.mjenks.net sshd[1225118]: Invalid user dircreate from 186.113.18.109 port 60756
2020-09-14T19:15:35.882965server.mjenks.net sshd[1225118]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=186.113.18.109
2020-09-14T19:15:35.875808server.mjenks.net sshd[1225118]: Invalid user dircreate from 186.113.18.109 port 60756
2020-09-14T19:15:37.407093server.mjenks.net sshd[1225118]: Failed password for invalid user dircreate from 186.113.18.109 port 60756 ssh2
...
2020-09-15 12:47:15
190.226.244.9 attack
Sep 14 23:54:39 ns3033917 sshd[13946]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.226.244.9
Sep 14 23:54:39 ns3033917 sshd[13946]: Invalid user mc from 190.226.244.9 port 33906
Sep 14 23:54:41 ns3033917 sshd[13946]: Failed password for invalid user mc from 190.226.244.9 port 33906 ssh2
...
2020-09-15 12:32:36
80.98.244.205 attackspambots
Sep 15 06:27:24 nuernberg-4g-01 sshd[14087]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.98.244.205 
Sep 15 06:27:27 nuernberg-4g-01 sshd[14087]: Failed password for invalid user admin from 80.98.244.205 port 50733 ssh2
Sep 15 06:32:50 nuernberg-4g-01 sshd[15944]: Failed password for root from 80.98.244.205 port 57103 ssh2
2020-09-15 12:34:12
134.175.132.12 attack
Sep 15 06:09:52 itv-usvr-02 sshd[27552]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.132.12  user=root
Sep 15 06:13:29 itv-usvr-02 sshd[27672]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.132.12  user=root
Sep 15 06:17:06 itv-usvr-02 sshd[27848]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.132.12  user=root
2020-09-15 12:49:34
185.250.205.84 attackspambots
firewall-block, port(s): 23760/tcp, 25961/tcp, 48057/tcp, 50322/tcp, 54353/tcp, 59406/tcp, 64359/tcp
2020-09-15 12:32:57
51.83.42.212 attackbotsspam
Brute%20Force%20SSH
2020-09-15 12:43:44
111.67.207.218 attackbotsspam
DATE:2020-09-15 05:55:44, IP:111.67.207.218, PORT:ssh SSH brute force auth (docker-dc)
2020-09-15 12:40:50
185.202.1.123 attackbots
RDP Bruteforce
2020-09-15 13:07:21
112.85.42.176 attack
Sep 14 21:46:40 dignus sshd[28959]: Failed password for root from 112.85.42.176 port 62251 ssh2
Sep 14 21:46:44 dignus sshd[28959]: Failed password for root from 112.85.42.176 port 62251 ssh2
Sep 14 21:46:47 dignus sshd[28959]: Failed password for root from 112.85.42.176 port 62251 ssh2
Sep 14 21:46:50 dignus sshd[28959]: Failed password for root from 112.85.42.176 port 62251 ssh2
Sep 14 21:46:54 dignus sshd[28959]: Failed password for root from 112.85.42.176 port 62251 ssh2
...
2020-09-15 12:52:07
159.89.199.182 attackspam
Sep 15 03:10:02 gospond sshd[10536]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.89.199.182  user=root
Sep 15 03:10:04 gospond sshd[10536]: Failed password for root from 159.89.199.182 port 46628 ssh2
...
2020-09-15 12:55:20
218.92.0.172 attackspambots
Sep 15 06:35:06 abendstille sshd\[11988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
Sep 15 06:35:07 abendstille sshd\[11992\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.172  user=root
Sep 15 06:35:08 abendstille sshd\[11988\]: Failed password for root from 218.92.0.172 port 13405 ssh2
Sep 15 06:35:08 abendstille sshd\[11992\]: Failed password for root from 218.92.0.172 port 48298 ssh2
Sep 15 06:35:11 abendstille sshd\[11988\]: Failed password for root from 218.92.0.172 port 13405 ssh2
...
2020-09-15 12:37:25
185.234.217.123 attackspam
RDPBrutePap
2020-09-15 13:06:33
194.149.33.10 attackbots
Sep 15 07:00:51 vmd17057 sshd[4749]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=194.149.33.10 
Sep 15 07:00:53 vmd17057 sshd[4749]: Failed password for invalid user teamspeak3 from 194.149.33.10 port 51502 ssh2
...
2020-09-15 13:04:28

Recently Reported IPs

246.47.162.168 45.87.17.220 118.172.220.11 122.131.110.134
5.122.216.134 80.157.242.193 90.60.1.64 75.32.115.21
192.18.101.217 224.70.58.80 7.74.3.222 6.33.67.62
40.78.88.73 45.2.49.61 252.25.7.58 25.68.2.53
118.221.238.61 249.84.46.62 140.41.60.112 50.37.2.147