Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Seattle

Region: Washington

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.240.12.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 45616
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;3.240.12.48.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019082300 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Sat Aug 24 01:47:37 CST 2019
;; MSG SIZE  rcvd: 115
Host info
Host 48.12.240.3.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 48.12.240.3.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
112.85.42.67 attackspambots
Sep 19 16:44:28 plusreed sshd[15647]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.67  user=root
Sep 19 16:44:30 plusreed sshd[15647]: Failed password for root from 112.85.42.67 port 43715 ssh2
...
2020-09-20 05:00:08
91.124.105.229 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 05:03:54
103.133.214.157 attackspambots
21 attempts against mh-ssh on sonic
2020-09-20 04:55:30
222.186.175.154 attackspam
Sep 19 22:59:10 theomazars sshd[21144]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.175.154  user=root
Sep 19 22:59:11 theomazars sshd[21144]: Failed password for root from 222.186.175.154 port 3398 ssh2
2020-09-20 04:59:44
45.143.221.82 attack
Port Scan: TCP/23
2020-09-20 05:18:22
112.118.55.82 attackbotsspam
Sep 19 19:02:49 vps639187 sshd\[27196\]: Invalid user admin from 112.118.55.82 port 48709
Sep 19 19:02:49 vps639187 sshd\[27196\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.118.55.82
Sep 19 19:02:51 vps639187 sshd\[27196\]: Failed password for invalid user admin from 112.118.55.82 port 48709 ssh2
...
2020-09-20 04:51:39
121.69.89.78 attackbotsspam
Invalid user vbox from 121.69.89.78 port 49642
2020-09-20 05:14:36
177.67.49.122 attack
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 05:19:50
192.42.116.14 attackbotsspam
2020-09-19T20:36:31+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-09-20 05:25:18
74.82.47.18 attackspambots
Telnet Server BruteForce Attack
2020-09-20 05:27:07
209.17.97.26 attackbotsspam
Port scan: Attack repeated for 24 hours
2020-09-20 05:00:57
190.219.176.76 attackspambots
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 05:11:22
207.233.9.122 attackbots
Attempt to log in to restricted site
2020-09-20 05:04:46
87.231.27.105 attackspam
SSH/22 MH Probe, BF, Hack -
2020-09-20 04:57:49
116.49.231.222 attackspam
Connection to SSH Honeypot - Detected by HoneypotDB
2020-09-20 05:03:38

Recently Reported IPs

83.91.135.182 200.189.116.46 143.35.90.190 95.25.74.84
167.57.217.128 77.22.4.171 172.230.135.123 47.125.68.99
79.173.235.248 184.144.88.81 72.204.191.233 175.242.45.200
85.53.168.76 211.160.10.60 58.197.81.52 110.192.72.74
57.105.114.139 77.132.26.85 210.128.232.187 71.166.223.141