Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 254.48.112.225
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18935
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;254.48.112.225.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 06:55:11 CST 2025
;; MSG SIZE  rcvd: 107
Host info
Host 225.112.48.254.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 225.112.48.254.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
164.132.49.98 attackbotsspam
Invalid user nagios from 164.132.49.98 port 42954
2020-02-21 18:01:50
195.228.137.52 spambotsattackproxynormal
50
2020-02-21 17:43:14
202.29.220.114 attack
Invalid user user11 from 202.29.220.114 port 57698
2020-02-21 17:40:07
165.227.210.71 attackbotsspam
Feb 20 22:36:31 sachi sshd\[23855\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.210.71  user=www-data
Feb 20 22:36:33 sachi sshd\[23855\]: Failed password for www-data from 165.227.210.71 port 52344 ssh2
Feb 20 22:39:27 sachi sshd\[24214\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=165.227.210.71  user=daemon
Feb 20 22:39:29 sachi sshd\[24214\]: Failed password for daemon from 165.227.210.71 port 51872 ssh2
Feb 20 22:42:14 sachi sshd\[24451\]: Invalid user ubuntu from 165.227.210.71
2020-02-21 17:43:32
216.45.23.6 attackspam
Feb 21 08:18:32 [snip] sshd[14211]: Invalid user alex from 216.45.23.6 port 48197
Feb 21 08:18:32 [snip] sshd[14211]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=216.45.23.6
Feb 21 08:18:33 [snip] sshd[14211]: Failed password for invalid user alex from 216.45.23.6 port 48197 ssh2[...]
2020-02-21 17:52:52
79.13.85.97 attackbotsspam
port scan and connect, tcp 23 (telnet)
2020-02-21 17:32:47
140.143.204.146 attackspam
Feb 20 22:12:32 wbs sshd\[16675\]: Invalid user pi from 140.143.204.146
Feb 20 22:12:32 wbs sshd\[16675\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.204.146
Feb 20 22:12:34 wbs sshd\[16675\]: Failed password for invalid user pi from 140.143.204.146 port 37446 ssh2
Feb 20 22:15:26 wbs sshd\[16916\]: Invalid user ftp from 140.143.204.146
Feb 20 22:15:26 wbs sshd\[16916\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.204.146
2020-02-21 17:25:47
83.12.171.68 attackspambots
Feb 21 10:11:31 ift sshd\[10523\]: Invalid user chris from 83.12.171.68Feb 21 10:11:33 ift sshd\[10523\]: Failed password for invalid user chris from 83.12.171.68 port 37568 ssh2Feb 21 10:15:20 ift sshd\[11167\]: Invalid user ubuntu from 83.12.171.68Feb 21 10:15:21 ift sshd\[11167\]: Failed password for invalid user ubuntu from 83.12.171.68 port 6202 ssh2Feb 21 10:19:13 ift sshd\[11573\]: Failed password for www-data from 83.12.171.68 port 2256 ssh2
...
2020-02-21 17:43:09
51.91.100.109 attackbots
Feb 21 08:14:32 MK-Soft-VM6 sshd[20884]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.91.100.109 
Feb 21 08:14:35 MK-Soft-VM6 sshd[20884]: Failed password for invalid user git from 51.91.100.109 port 49530 ssh2
...
2020-02-21 17:52:36
59.127.235.92 attackbots
Port Scan
2020-02-21 17:39:19
45.248.159.181 attackspam
20/2/21@00:54:15: FAIL: Alarm-Network address from=45.248.159.181
...
2020-02-21 17:59:03
202.101.58.90 attackspambots
Invalid user admin from 202.101.58.90 port 28936
2020-02-21 17:24:42
46.101.103.191 attackspambots
Feb 21 12:36:57 server sshd\[13606\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.103.191  user=root
Feb 21 12:36:59 server sshd\[13606\]: Failed password for root from 46.101.103.191 port 36626 ssh2
Feb 21 12:37:34 server sshd\[13685\]: Invalid user oracle from 46.101.103.191
Feb 21 12:37:34 server sshd\[13685\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.101.103.191 
Feb 21 12:37:36 server sshd\[13685\]: Failed password for invalid user oracle from 46.101.103.191 port 39984 ssh2
...
2020-02-21 17:55:20
139.59.0.90 attack
Invalid user shannon from 139.59.0.90 port 46694
2020-02-21 18:02:43
190.52.166.83 attackspambots
Invalid user web from 190.52.166.83 port 36328
2020-02-21 17:46:32

Recently Reported IPs

43.169.202.3 87.129.77.142 203.108.201.15 206.55.3.236
216.73.28.184 140.181.123.240 197.189.42.179 179.23.111.126
90.129.74.166 121.21.253.110 218.199.18.121 96.102.139.173
137.87.236.106 231.165.238.213 30.237.195.103 159.60.239.21
191.75.240.209 218.26.141.191 200.23.201.69 194.61.54.30