Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 3.48.145.134
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 29093
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;3.48.145.134.			IN	A

;; AUTHORITY SECTION:
.			439	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022012200 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 22 16:29:40 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 134.145.48.3.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 134.145.48.3.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
89.40.115.140 attackbots
\[2019-10-28 09:33:23\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '89.40.115.140:58010' - Wrong password
\[2019-10-28 09:33:23\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-28T09:33:23.171-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="155551",SessionID="0x7fdf2c003608",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/89.40.115.140/58010",Challenge="277dade0",ReceivedChallenge="277dade0",ReceivedHash="ac52750ef217772454be0ca95e660e34"
\[2019-10-28 09:33:23\] NOTICE\[2601\] chan_sip.c: Registration from '\' failed for '89.40.115.140:58185' - Wrong password
\[2019-10-28 09:33:23\] SECURITY\[2634\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-10-28T09:33:23.289-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="2001",SessionID="0x7fdf2c144d18",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/89.40
2019-10-28 21:49:38
46.38.144.146 attack
Oct 28 15:07:18 relay postfix/smtpd\[30485\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 28 15:08:04 relay postfix/smtpd\[24072\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 28 15:08:32 relay postfix/smtpd\[30485\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 28 15:09:14 relay postfix/smtpd\[26829\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Oct 28 15:09:44 relay postfix/smtpd\[25802\]: warning: unknown\[46.38.144.146\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-10-28 22:22:05
120.28.115.2 attack
5984/tcp 83/tcp 1588/tcp...
[2019-09-04/10-27]31pkt,11pt.(tcp)
2019-10-28 22:09:39
136.35.205.202 attackbots
SSH Scan
2019-10-28 22:16:47
159.203.193.43 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2019-10-28 21:53:40
109.230.219.100 attack
SMB Server BruteForce Attack
2019-10-28 22:18:52
35.172.117.68 attack
Oct 28 14:07:07 vmanager6029 sshd\[24494\]: Invalid user webmaster from 35.172.117.68 port 41324
Oct 28 14:07:07 vmanager6029 sshd\[24494\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=35.172.117.68
Oct 28 14:07:09 vmanager6029 sshd\[24494\]: Failed password for invalid user webmaster from 35.172.117.68 port 41324 ssh2
2019-10-28 21:51:24
179.106.168.29 attackspambots
Mail/25/465/587-993/995 Probe, Reject, BadAuth, Hack, SPAM -
2019-10-28 22:23:07
165.22.103.180 attack
SSH Scan
2019-10-28 21:53:16
182.61.163.126 attackbots
Tried sshing with brute force.
2019-10-28 21:55:02
190.7.128.74 attackbots
Oct 28 13:58:54 localhost sshd\[45178\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.7.128.74  user=root
Oct 28 13:58:56 localhost sshd\[45178\]: Failed password for root from 190.7.128.74 port 30354 ssh2
Oct 28 14:04:03 localhost sshd\[45300\]: Invalid user ag from 190.7.128.74 port 58080
Oct 28 14:04:03 localhost sshd\[45300\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.7.128.74
Oct 28 14:04:04 localhost sshd\[45300\]: Failed password for invalid user ag from 190.7.128.74 port 58080 ssh2
...
2019-10-28 22:12:49
123.207.108.51 attack
Automatic report - SSH Brute-Force Attack
2019-10-28 22:12:03
94.177.163.133 attackspam
5x Failed Password
2019-10-28 21:54:08
156.197.7.194 attackbots
IP Ban Report :  
 https://help-dysk.pl/wordpress-firewall-plugins/ip/156.197.7.194/ 
 
 EG - 1H : (315)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : EG 
 NAME ASN : ASN8452 
 
 IP : 156.197.7.194 
 
 CIDR : 156.197.0.0/19 
 
 PREFIX COUNT : 833 
 
 UNIQUE IP COUNT : 7610368 
 
 
 ATTACKS DETECTED ASN8452 :  
  1H - 9 
  3H - 26 
  6H - 55 
 12H - 122 
 24H - 306 
 
 DateTime : 2019-10-28 12:52:18 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-28 21:58:48
185.175.93.105 attack
10/28/2019-10:03:58.097329 185.175.93.105 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-10-28 22:04:16

Recently Reported IPs

163.26.93.115 103.188.255.91 33.88.238.221 61.36.64.241
123.104.88.83 97.66.189.102 16.61.83.192 227.53.16.181
80.57.1.99 153.166.204.108 21.51.142.138 198.145.5.214
211.241.174.11 38.36.21.139 135.248.57.16 43.89.9.56
210.192.88.48 229.251.62.250 54.254.254.206 170.13.200.185