Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States of America (the)

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 48.57.45.7
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40097
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;48.57.45.7.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025121401 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Dec 15 12:51:42 CST 2025
;; MSG SIZE  rcvd: 103
Host info
Host 7.45.57.48.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 7.45.57.48.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
51.178.55.92 attackspambots
web-1 [ssh] SSH Attack
2020-03-26 07:17:17
49.235.169.15 attackbotsspam
Invalid user stuser from 49.235.169.15 port 39124
2020-03-26 07:34:17
82.53.28.140 attackbots
20/3/25@17:42:43: FAIL: Alarm-Network address from=82.53.28.140
20/3/25@17:42:43: FAIL: Alarm-Network address from=82.53.28.140
...
2020-03-26 07:39:33
103.145.13.4 attack
Automatic report - Banned IP Access
2020-03-26 07:37:36
103.57.123.1 attackbots
Mar 25 19:31:24 NPSTNNYC01T sshd[31299]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.57.123.1
Mar 25 19:31:26 NPSTNNYC01T sshd[31299]: Failed password for invalid user kubota from 103.57.123.1 port 50842 ssh2
Mar 25 19:35:10 NPSTNNYC01T sshd[31528]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.57.123.1
...
2020-03-26 07:37:48
179.108.253.9 attackbotsspam
" "
2020-03-26 07:20:28
92.63.194.90 attackbotsspam
Mar 26 00:23:19 ovpn sshd\[24739\]: Invalid user 1234 from 92.63.194.90
Mar 26 00:23:19 ovpn sshd\[24739\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90
Mar 26 00:23:21 ovpn sshd\[24739\]: Failed password for invalid user 1234 from 92.63.194.90 port 54108 ssh2
Mar 26 00:24:22 ovpn sshd\[25023\]: Invalid user user from 92.63.194.90
Mar 26 00:24:22 ovpn sshd\[25023\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=92.63.194.90
2020-03-26 07:30:45
183.56.212.91 attack
SSH authentication failure x 6 reported by Fail2Ban
...
2020-03-26 07:47:13
13.127.57.9 attackspambots
SSH Invalid Login
2020-03-26 07:19:57
60.210.40.210 attack
Invalid user guest4 from 60.210.40.210 port 2120
2020-03-26 07:44:37
116.246.21.23 attack
03/25/2020-17:55:57.751847 116.246.21.23 Protocol: 6 ET SCAN Potential SSH Scan
2020-03-26 07:19:24
62.210.205.197 attackbotsspam
Invalid user lisabona from 62.210.205.197 port 33988
2020-03-26 07:25:05
111.177.16.4 attackbotsspam
Brute-force attempt banned
2020-03-26 07:22:21
178.128.226.2 attack
Invalid user uploadu from 178.128.226.2 port 60193
2020-03-26 07:41:39
185.220.100.255 attackspambots
Mar 26 00:08:12 vpn01 sshd[27224]: Failed password for root from 185.220.100.255 port 11256 ssh2
Mar 26 00:08:15 vpn01 sshd[27224]: Failed password for root from 185.220.100.255 port 11256 ssh2
...
2020-03-26 07:17:04

Recently Reported IPs

124.231.225.158 71.228.19.129 5.100.36.79 202.165.255.209
48.196.230.109 227.187.75.227 187.211.76.26 166.60.139.97
187.154.142.78 135.113.253.98 10.63.149.113 208.3.210.222
58.53.43.116 177.121.25.226 221.252.106.50 15.60.102.74
185.207.79.161 185.118.16.12 45.186.73.50 190.159.13.109