Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United Kingdom of Great Britain and Northern Ireland (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.208.4.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18864
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.208.4.145.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025013100 1800 900 604800 86400

;; Query time: 12 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Jan 31 14:41:26 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 145.4.208.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.4.208.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
170.0.125.50 attackspambots
[Aegis] @ 2019-07-26 20:44:30  0100 -> Multiple attempts to send e-mail from invalid/unknown sender domain.
2019-07-27 09:17:58
113.160.226.24 attackbotsspam
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-07-25 18:10:31,129 INFO [shellcode_manager] (113.160.226.24) no match, writing hexdump (888c0afcd520dc5492fb885a1b90874f :13499) - SMB (Unknown)
2019-07-27 09:35:04
78.247.18.64 attackspam
Jul 26 22:38:15 srv-4 sshd\[25313\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.247.18.64  user=root
Jul 26 22:38:17 srv-4 sshd\[25313\]: Failed password for root from 78.247.18.64 port 42458 ssh2
Jul 26 22:44:03 srv-4 sshd\[25839\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=78.247.18.64  user=root
...
2019-07-27 09:37:44
154.8.223.253 attackbotsspam
k+ssh-bruteforce
2019-07-27 08:56:30
201.251.10.200 attackbotsspam
Repeated brute force against a port
2019-07-27 09:37:10
153.36.240.126 attackbots
Jul 26 19:58:38 aat-srv002 sshd[10118]: Failed password for root from 153.36.240.126 port 13956 ssh2
Jul 26 19:58:40 aat-srv002 sshd[10118]: Failed password for root from 153.36.240.126 port 13956 ssh2
Jul 26 19:58:42 aat-srv002 sshd[10118]: Failed password for root from 153.36.240.126 port 13956 ssh2
Jul 26 19:58:48 aat-srv002 sshd[10131]: Failed password for root from 153.36.240.126 port 43715 ssh2
...
2019-07-27 09:12:09
118.172.115.3 attackspam
Automatic report - Port Scan Attack
2019-07-27 09:13:41
144.217.40.3 attackspambots
Jul 27 02:31:48 SilenceServices sshd[27725]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.40.3
Jul 27 02:31:50 SilenceServices sshd[27725]: Failed password for invalid user lsu from 144.217.40.3 port 37610 ssh2
Jul 27 02:36:15 SilenceServices sshd[410]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=144.217.40.3
2019-07-27 09:56:30
67.207.89.133 attackbots
2019-07-27T01:33:38.622105abusebot.cloudsearch.cf sshd\[5043\]: Invalid user vagrant from 67.207.89.133 port 57654
2019-07-27 09:49:18
96.57.28.210 attackspam
2019-07-26T23:17:32.747853abusebot-2.cloudsearch.cf sshd\[19122\]: Invalid user jet from 96.57.28.210 port 36460
2019-07-27 09:31:51
185.85.239.195 attackspambots
WordPress brute force
2019-07-27 08:58:34
51.75.251.153 attackbotsspam
Jul 27 02:15:26 debian sshd\[22748\]: Invalid user 123168425 from 51.75.251.153 port 55216
Jul 27 02:15:26 debian sshd\[22748\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.75.251.153
...
2019-07-27 09:16:16
175.150.109.145 attackspam
" "
2019-07-27 09:17:05
45.34.14.113 attackbotsspam
SSH-BruteForce
2019-07-27 09:34:17
117.139.166.203 attack
Jul 26 23:52:55 ks10 sshd[18484]: Failed password for root from 117.139.166.203 port 52627 ssh2
...
2019-07-27 08:56:53

Recently Reported IPs

143.51.24.105 82.110.62.154 92.202.73.97 101.204.19.136
57.1.174.190 148.167.246.152 92.214.24.80 124.202.71.71
137.228.9.170 33.248.13.13 195.173.138.52 228.129.160.130
47.105.145.46 123.162.56.82 35.167.219.5 132.95.119.69
161.151.202.69 3.219.238.93 252.148.230.125 141.180.100.142