Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 54.48.205.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 59680
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;54.48.205.12.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020401 1800 900 604800 86400

;; Query time: 11 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 05 10:01:35 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 12.205.48.54.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.205.48.54.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
23.250.26.118 attackbots
(From mark@tlcmedia.xyz) Receive $250 Payments Daily Directly To Your Bank Without Speaking To Anyone!
 
NO SELLING, NO TALKING TO PROSPECTS, NO EXPLAINING!
 
=> Click Here To Get Started
https://tlcmedia.xyz/go/y/
 
Fully Automated System Does All The Work!  You Receive Your Instant $250 Payments Over & Over Again!
 
=> Click Here To Get Started
https://tlcmedia.xyz/go/y/
 
Take Massive Action and Get Started Today!
 

Speak soon,
Mark
2020-06-03 18:27:40
92.118.160.17 attack
MultiHost/MultiPort Probe, Scan, Hack -
2020-06-03 18:00:46
167.172.248.124 attackbotsspam
SmallBizIT.US 1 packets to tcp(22)
2020-06-03 18:07:22
222.186.169.194 attack
SSH invalid-user multiple login attempts
2020-06-03 18:12:24
180.254.87.251 attackspambots
SMB Server BruteForce Attack
2020-06-03 18:13:23
166.175.188.224 attackspam
Brute forcing email accounts
2020-06-03 18:10:07
89.248.167.141 attackspambots
constant ddos on my router
2020-06-03 18:01:59
188.128.39.113 attack
Invalid user lehrmann from 188.128.39.113 port 58022
2020-06-03 17:51:35
81.19.215.118 attackspam
81.19.215.118 - - [03/Jun/2020:13:57:42 +0400] "POST /GponForm/diag_Form?style/ HTTP/1.1" 502 157 "-" "curl/7.3.2"
...
2020-06-03 18:00:09
5.9.61.101 attack
20 attempts against mh-misbehave-ban on pluto
2020-06-03 18:25:05
185.234.219.224 attackbots
Jun  3 12:15:06 ns3042688 courier-pop3d: LOGIN FAILED, user=info@tienda-dewalt.com, ip=\[::ffff:185.234.219.224\]
...
2020-06-03 18:26:53
218.79.42.6 attack
Jun  3 11:30:06 roki-contabo sshd\[27079\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.79.42.6  user=root
Jun  3 11:30:07 roki-contabo sshd\[27079\]: Failed password for root from 218.79.42.6 port 34566 ssh2
Jun  3 11:36:45 roki-contabo sshd\[27202\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.79.42.6  user=root
Jun  3 11:36:47 roki-contabo sshd\[27202\]: Failed password for root from 218.79.42.6 port 7386 ssh2
Jun  3 11:38:58 roki-contabo sshd\[27254\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.79.42.6  user=root
...
2020-06-03 18:25:25
94.98.233.0 attackbots
20 attempts against mh-ssh on echoip
2020-06-03 18:01:34
79.3.6.207 attackbots
2020-06-02 UTC: (25x) - root(25x)
2020-06-03 18:20:10
5.182.39.62 attackbots
Cowrie Honeypot: 10 unauthorised SSH/Telnet login attempts between 2020-06-03T09:23:33Z and 2020-06-03T10:07:34Z
2020-06-03 18:09:32

Recently Reported IPs

207.203.221.124 220.189.11.78 57.182.185.173 186.73.150.170
81.133.45.252 76.162.10.237 47.246.64.173 125.30.212.102
4.44.42.247 26.183.48.147 32.52.102.132 246.138.11.64
99.129.95.219 67.46.170.126 219.218.183.200 37.240.252.22
63.221.185.151 96.247.65.164 184.164.59.120 194.117.213.164