Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.11.64.54
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 52628
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.11.64.54.			IN	A

;; AUTHORITY SECTION:
.			451	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2021123100 1800 900 604800 86400

;; Query time: 94 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 01 01:36:03 CST 2022
;; MSG SIZE  rcvd: 104
Host info
Host 54.64.11.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 54.64.11.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
36.68.202.141 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-19 23:15:23
221.144.30.240 attackspam
Honeypot attack, port: 81, PTR: PTR record not found
2020-01-19 23:00:10
182.99.127.63 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-19 23:22:51
203.218.98.91 attackspam
Honeypot attack, port: 5555, PTR: pcd308091.netvigator.com.
2020-01-19 23:00:58
202.29.22.251 attackspam
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-19 23:14:06
157.230.248.89 attackspam
xmlrpc attack
2020-01-19 23:36:19
60.243.93.49 attack
Unauthorized connection attempt from 60.243.93.49:49954->xxxx:23 (Telnet)
2020-01-19 23:29:43
186.148.4.20 attackspambots
Honeypot attack, port: 445, PTR: 186-148-4-20.static.mundo.movistar.cl.
2020-01-19 23:41:39
222.186.175.169 attackspambots
Unauthorized connection attempt detected from IP address 222.186.175.169 to port 22 [J]
2020-01-19 23:16:26
37.190.26.141 attack
smtp probe/invalid login attempt
2020-01-19 23:41:10
221.13.203.109 attackspambots
Jan 19 16:26:38 mout sshd[697]: Invalid user vyos from 221.13.203.109 port 2171
2020-01-19 23:27:23
71.139.124.243 attackspambots
Unauthorized connection attempt detected from IP address 71.139.124.243 to port 2220 [J]
2020-01-19 23:29:06
92.222.127.232 attack
Failed password for root from 92.222.127.232 port 44164 ssh2
Failed password for root from 92.222.127.232 port 44164 ssh2
Failed password for root from 92.222.127.232 port 44164 ssh2
Failed password for root from 92.222.127.232 port 44164 ssh2
2020-01-19 23:38:07
222.186.180.142 attackspambots
Brute-force attempt banned
2020-01-19 23:34:43
222.254.27.212 attack
Unauthorized connection attempt detected from IP address 222.254.27.212 to port 83 [J]
2020-01-19 23:23:29

Recently Reported IPs

15.28.195.2 182.22.223.23 41.222.119.177 217.164.188.153
234.10.35.22 217.165.57.56 54.174.13.50 98.111.130.183
245.67.121.59 123.70.178.254 45.80.145.233 168.62.29.77
94.80.107.57 238.58.40.229 151.64.188.85 115.61.170.18
143.232.161.119 201.7.234.106 110.196.54.251 39.186.20.205