Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Los Angeles

Region: California

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
45.11.0.148 attackspambots
Hits on port : 11211
2020-04-22 18:25:53
45.11.0.133 attackbotsspam
Scanning random ports - tries to find possible vulnerable services
2019-11-22 05:35:44
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.11.0.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23308
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.11.0.48.			IN	A

;; AUTHORITY SECTION:
.			345	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022062400 1800 900 604800 86400

;; Query time: 21 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jun 24 14:04:16 CST 2022
;; MSG SIZE  rcvd: 103
Host info
Host 48.0.11.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.0.11.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
213.14.114.226 attackbots
445/tcp 445/tcp 445/tcp...
[2020-07-28/09-26]5pkt,1pt.(tcp)
2020-09-27 21:01:11
124.196.17.78 attack
Invalid user postgres from 124.196.17.78 port 47840
2020-09-27 20:52:03
51.104.16.192 attack
Invalid user admin from 51.104.16.192 port 10596
2020-09-27 21:04:17
111.161.41.156 attackspam
2020-09-27T14:07:54+0200 Failed SSH Authentication/Brute Force Attack.(Server 2)
2020-09-27 20:53:46
54.37.143.192 attack
(sshd) Failed SSH login from 54.37.143.192 (FR/France/ip192.ip-54-37-143.eu): 5 in the last 3600 secs
2020-09-27 21:14:17
103.145.13.43 attackspam
scans 2 times in preceeding hours on the ports (in chronological order) 50802 5038 resulting in total of 23 scans from 103.145.13.0/24 block.
2020-09-27 21:03:56
218.87.149.136 attack
 TCP (SYN) 218.87.149.136:50229 -> port 1433, len 40
2020-09-27 20:58:26
51.116.182.194 attack
Invalid user 139 from 51.116.182.194 port 39490
2020-09-27 21:16:08
129.56.23.25 attackbots
2020-09-27 21:03:04
190.4.16.86 attack
 TCP (SYN) 190.4.16.86:38363 -> port 8080, len 40
2020-09-27 21:06:27
177.107.199.34 attack
445/tcp 445/tcp 445/tcp...
[2020-09-15/25]6pkt,1pt.(tcp)
2020-09-27 20:36:19
52.188.5.139 attackbots
Flask-IPban - exploit URL requested:/xmlrpc.php
2020-09-27 20:42:50
150.109.181.217 attackspam
4040/tcp 1911/tcp 523/tcp...
[2020-08-08/09-26]5pkt,5pt.(tcp)
2020-09-27 21:10:03
192.99.3.173 attackspam
Unauthorized connection attempt from IP address 192.99.3.173 on Port 445(SMB)
2020-09-27 20:40:32
37.107.85.181 attack
1601152772 - 09/26/2020 22:39:32 Host: 37.107.85.181/37.107.85.181 Port: 445 TCP Blocked
2020-09-27 21:14:47

Recently Reported IPs

192.241.219.44 45.79.126.132 47.205.222.120 20.102.68.120
1.0.158.141 20.89.110.50 52.151.65.193 170.233.193.129
20.219.153.189 137.226.9.73 137.226.11.150 13.90.36.195
20.111.22.218 20.119.97.71 167.71.62.179 13.127.214.170
137.226.30.162 5.167.71.165 5.167.71.240 47.196.217.134