Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Sanayi

Region: Antalya

Country: Turkey

Internet Service Provider: unknown

Hostname: unknown

Organization: SPDNet Telekomunikasyon Hizmetleri Bilgi Teknolojileri Taahhut Sanayi Ve Ticaret A.S.

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:

; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.8.248.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 9113
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;45.8.248.12.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019053000 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Thu May 30 21:45:34 CST 2019
;; MSG SIZE  rcvd: 115

Host info
Host 12.248.8.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 12.248.8.45.in-addr.arpa: NXDOMAIN

Related IP info:
Related comments:
IP Type Details Datetime
113.59.13.111 attackbotsspam
Scanning and Vuln Attempts
2019-06-26 20:52:07
202.182.174.102 attack
2019-06-26T12:48:15.450311enmeeting.mahidol.ac.th sshd\[24015\]: Invalid user solr from 202.182.174.102 port 33243
2019-06-26T12:48:15.470583enmeeting.mahidol.ac.th sshd\[24015\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.182.174.102
2019-06-26T12:48:17.624363enmeeting.mahidol.ac.th sshd\[24015\]: Failed password for invalid user solr from 202.182.174.102 port 33243 ssh2
...
2019-06-26 20:56:16
114.67.232.241 attack
Automatic report - Web App Attack
2019-06-26 20:33:23
112.85.42.176 attackspambots
2019-06-26T10:39:40.326436lon01.zurich-datacenter.net sshd\[11380\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=112.85.42.176  user=root
2019-06-26T10:39:43.102495lon01.zurich-datacenter.net sshd\[11380\]: Failed password for root from 112.85.42.176 port 14351 ssh2
2019-06-26T10:39:45.442457lon01.zurich-datacenter.net sshd\[11380\]: Failed password for root from 112.85.42.176 port 14351 ssh2
2019-06-26T10:39:48.190438lon01.zurich-datacenter.net sshd\[11380\]: Failed password for root from 112.85.42.176 port 14351 ssh2
2019-06-26T10:39:50.688369lon01.zurich-datacenter.net sshd\[11380\]: Failed password for root from 112.85.42.176 port 14351 ssh2
...
2019-06-26 20:31:54
113.200.88.211 attackbotsspam
Scanning and Vuln Attempts
2019-06-26 21:03:17
27.246.106.244 attackspambots
445/tcp
[2019-06-26]1pkt
2019-06-26 21:04:08
103.94.171.142 attackspambots
Unauthorized connection attempt from IP address 103.94.171.142 on Port 445(SMB)
2019-06-26 20:55:44
131.221.97.186 attackspam
Honeypot hit.
2019-06-26 20:58:42
114.39.230.121 attackbots
Scanning and Vuln Attempts
2019-06-26 20:45:48
118.71.250.227 attack
Unauthorized connection attempt from IP address 118.71.250.227 on Port 445(SMB)
2019-06-26 21:02:35
165.227.210.71 attack
[ssh] SSH attack
2019-06-26 20:20:00
157.230.91.45 attackbotsspam
Jun 26 14:44:01 localhost sshd\[453\]: Invalid user lucia from 157.230.91.45
Jun 26 14:44:01 localhost sshd\[453\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45
Jun 26 14:44:03 localhost sshd\[453\]: Failed password for invalid user lucia from 157.230.91.45 port 47682 ssh2
Jun 26 14:45:40 localhost sshd\[671\]: Invalid user webuser from 157.230.91.45
Jun 26 14:45:40 localhost sshd\[671\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.91.45
...
2019-06-26 21:09:40
42.58.22.11 attackbotsspam
5500/tcp
[2019-06-26]1pkt
2019-06-26 20:51:14
14.182.123.42 attackspambots
445/tcp
[2019-06-26]1pkt
2019-06-26 20:20:48
35.237.232.107 attackbots
RDP Brute-Force (Grieskirchen RZ1)
2019-06-26 20:44:15

Recently Reported IPs

199.250.217.130 24.15.128.56 14.181.143.252 161.76.81.134
70.195.245.77 59.0.227.30 12.38.187.101 91.214.132.226
83.243.172.12 14.114.196.16 163.195.205.186 85.214.255.100
1.157.168.33 93.43.24.245 189.10.22.2 208.91.198.110
185.69.121.36 90.153.5.248 39.108.151.138 47.174.169.71