Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 53.48.162.145
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10087
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;53.48.162.145.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025032602 1800 900 604800 86400

;; Query time: 35 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Thu Mar 27 07:09:59 CST 2025
;; MSG SIZE  rcvd: 106
Host info
Host 145.162.48.53.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 145.162.48.53.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
114.113.81.130 attackspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-30 15:36:23
182.162.17.236 attackspambots
Sep 28 20:56:32 ovpn sshd[9232]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.17.236  user=r.r
Sep 28 20:56:34 ovpn sshd[9232]: Failed password for r.r from 182.162.17.236 port 45726 ssh2
Sep 28 20:56:34 ovpn sshd[9232]: Received disconnect from 182.162.17.236 port 45726:11: Bye Bye [preauth]
Sep 28 20:56:34 ovpn sshd[9232]: Disconnected from 182.162.17.236 port 45726 [preauth]
Sep 28 20:58:36 ovpn sshd[9698]: Invalid user minecraft from 182.162.17.236
Sep 28 20:58:36 ovpn sshd[9698]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.162.17.236
Sep 28 20:58:38 ovpn sshd[9698]: Failed password for invalid user minecraft from 182.162.17.236 port 53746 ssh2
Sep 28 20:58:38 ovpn sshd[9698]: Received disconnect from 182.162.17.236 port 53746:11: Bye Bye [preauth]
Sep 28 20:58:38 ovpn sshd[9698]: Disconnected from 182.162.17.236 port 53746 [preauth]

........
-----------------------------------------------
https://www.block
2020-09-30 15:11:35
190.73.45.75 attackspam
Brute-force attempt banned
2020-09-30 15:28:44
60.251.183.90 attack
Port scan denied
2020-09-30 15:48:27
45.163.188.1 attackbotsspam
2020-09-30T02:08:26.766315morrigan.ad5gb.com sshd[695585]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=45.163.188.1  user=root
2020-09-30T02:08:28.809852morrigan.ad5gb.com sshd[695585]: Failed password for root from 45.163.188.1 port 40218 ssh2
2020-09-30 15:21:37
185.153.199.132 attackspambots
Icarus honeypot on github
2020-09-30 15:58:41
92.63.197.55 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 80 - port: 3851 proto: tcp cat: Misc Attackbytes: 60
2020-09-30 15:43:21
85.209.0.150 attackspam
Sep 30 04:37:28 doubuntu sshd[2544]: Did not receive identification string from 85.209.0.150 port 40820
Sep 30 04:37:33 doubuntu sshd[2547]: Connection closed by authenticating user root 85.209.0.150 port 63176 [preauth]
Sep 30 04:37:33 doubuntu sshd[2548]: Connection closed by authenticating user root 85.209.0.150 port 49902 [preauth]
...
2020-09-30 15:12:43
85.209.0.251 attack
<6 unauthorized SSH connections
2020-09-30 15:09:10
190.0.159.74 attackspambots
Sep 30 00:08:37 abendstille sshd\[796\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.74  user=root
Sep 30 00:08:39 abendstille sshd\[796\]: Failed password for root from 190.0.159.74 port 34798 ssh2
Sep 30 00:14:05 abendstille sshd\[5592\]: Invalid user helpdeskhelpdesk from 190.0.159.74
Sep 30 00:14:05 abendstille sshd\[5592\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.0.159.74
Sep 30 00:14:06 abendstille sshd\[5592\]: Failed password for invalid user helpdeskhelpdesk from 190.0.159.74 port 59106 ssh2
...
2020-09-30 15:18:29
104.248.176.46 attackbots
Sep 29 04:55:50 *hidden* sshd[1063]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=104.248.176.46 user=root Sep 29 04:55:52 *hidden* sshd[1063]: Failed password for *hidden* from 104.248.176.46 port 50848 ssh2 Sep 29 04:59:53 *hidden* sshd[2859]: Invalid user proba from 104.248.176.46 port 58850
2020-09-30 15:37:59
45.148.122.13 attackbotsspam
Port scanning [3 denied]
2020-09-30 15:49:22
106.212.147.227 attackspam
Sep 30 00:28:26 sso sshd[19533]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.212.147.227
Sep 30 00:28:29 sso sshd[19533]: Failed password for invalid user admin2 from 106.212.147.227 port 55254 ssh2
...
2020-09-30 15:27:29
51.83.136.117 attackspam
Sep 29 19:18:06 ws22vmsma01 sshd[192332]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.83.136.117
Sep 29 19:18:07 ws22vmsma01 sshd[192332]: Failed password for invalid user office1 from 51.83.136.117 port 41324 ssh2
...
2020-09-30 15:10:49
95.156.113.49 attackspam
firewall-block, port(s): 445/tcp
2020-09-30 15:41:32

Recently Reported IPs

146.232.61.64 27.203.188.192 157.163.185.249 162.161.111.59
189.47.187.140 186.16.122.37 63.230.192.115 129.153.49.212
23.96.124.81 65.208.180.156 108.177.122.155 136.6.5.171
213.253.236.132 10.158.22.100 121.161.222.97 168.120.126.233
13.73.91.26 55.135.148.228 72.93.100.52 157.78.204.1