Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.12.222.135
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20089
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.12.222.135.			IN	A

;; AUTHORITY SECTION:
.			322	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023011601 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Jan 17 03:43:46 CST 2023
;; MSG SIZE  rcvd: 106
Host info
Host 135.222.12.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 135.222.12.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.67.176.32 attackbots
ssh brute force
2020-01-29 03:12:35
163.172.157.162 attackspambots
Unauthorized connection attempt detected from IP address 163.172.157.162 to port 2220 [J]
2020-01-29 03:06:54
213.32.122.82 attack
Unauthorized connection attempt detected from IP address 213.32.122.82 to port 443 [J]
2020-01-29 03:00:10
163.44.150.139 attack
Unauthorized connection attempt detected from IP address 163.44.150.139 to port 2220 [J]
2020-01-29 03:34:33
139.199.0.84 attackspam
SSH bruteforce (Triggered fail2ban)
2020-01-29 03:08:17
124.156.55.21 attack
Unauthorized connection attempt detected from IP address 124.156.55.21 to port 7070 [J]
2020-01-29 03:37:08
176.254.14.1 attack
Unauthorized connection attempt detected from IP address 176.254.14.1 to port 23 [J]
2020-01-29 03:05:25
5.71.237.131 attackspam
Unauthorized connection attempt detected from IP address 5.71.237.131 to port 81 [J]
2020-01-29 02:58:34
125.161.131.144 attackspambots
Unauthorized connection attempt detected from IP address 125.161.131.144 to port 4567 [J]
2020-01-29 03:36:45
212.36.231.206 attackspambots
Unauthorized connection attempt detected from IP address 212.36.231.206 to port 23 [J]
2020-01-29 03:26:36
111.125.67.125 attackbotsspam
Unauthorized connection attempt detected from IP address 111.125.67.125 to port 81 [J]
2020-01-29 03:13:41
222.186.42.155 attackspam
Jan 28 20:23:18 MK-Soft-VM8 sshd[436]: Failed password for root from 222.186.42.155 port 63561 ssh2
Jan 28 20:23:21 MK-Soft-VM8 sshd[436]: Failed password for root from 222.186.42.155 port 63561 ssh2
...
2020-01-29 03:23:58
98.22.30.51 attackbots
Unauthorized connection attempt detected from IP address 98.22.30.51 to port 443 [J]
2020-01-29 03:14:30
99.185.76.161 attack
Too many connections or unauthorized access detected from Arctic banned ip
2020-01-29 03:14:11
222.168.122.245 attackbotsspam
SSH Login Bruteforce
2020-01-29 03:24:23

Recently Reported IPs

48.177.69.216 212.29.2.152 47.60.64.43 209.14.165.92
70.40.242.119 46.52.160.134 143.148.225.4 46.250.0.114
46.240.40.134 182.53.106.240 46.221.71.189 46.213.11.77
46.203.194.240 94.17.118.119 83.69.233.142 46.182.58.198
46.162.167.174 61.46.218.167 165.255.59.125 46.110.132.233