Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 56.45.236.48
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 41460
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;56.45.236.48.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025030701 1800 900 604800 86400

;; Query time: 58 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Mar 08 03:04:54 CST 2025
;; MSG SIZE  rcvd: 105
Host info
Host 48.236.45.56.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 48.236.45.56.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
79.151.242.115 attack
Aug 25 13:11:12 marvibiene sshd[5386]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.151.242.115  user=root
Aug 25 13:11:15 marvibiene sshd[5386]: Failed password for root from 79.151.242.115 port 33874 ssh2
Aug 25 13:47:50 marvibiene sshd[9885]: Invalid user jquery from 79.151.242.115 port 56970
...
2019-08-25 22:16:22
5.62.41.170 attackbots
\[2019-08-25 10:15:48\] NOTICE\[1829\] chan_sip.c: Registration from '\' failed for '5.62.41.170:7643' - Wrong password
\[2019-08-25 10:15:48\] SECURITY\[1837\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-25T10:15:48.727-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="44534",SessionID="0x7f7b305df5a8",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.170/56102",Challenge="41f302d5",ReceivedChallenge="41f302d5",ReceivedHash="afdd089fff85ad583ac82bf1a481874e"
\[2019-08-25 10:16:49\] NOTICE\[1829\] chan_sip.c: Registration from '\' failed for '5.62.41.170:7738' - Wrong password
\[2019-08-25 10:16:49\] SECURITY\[1837\] res_security_log.c: SecurityEvent="InvalidPassword",EventTV="2019-08-25T10:16:49.898-0400",Severity="Error",Service="SIP",EventVersion="2",AccountID="48350",SessionID="0x7f7b305a3378",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/5.62.41.170/5
2019-08-25 22:20:04
190.111.239.35 attack
Aug 25 15:37:57 lnxmail61 sshd[9253]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=190.111.239.35
2019-08-25 22:11:38
125.163.230.220 attackspam
Aug 25 02:34:05 web1 sshd\[31837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.163.230.220  user=root
Aug 25 02:34:07 web1 sshd\[31837\]: Failed password for root from 125.163.230.220 port 38860 ssh2
Aug 25 02:39:20 web1 sshd\[32357\]: Invalid user jasmin from 125.163.230.220
Aug 25 02:39:20 web1 sshd\[32357\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=125.163.230.220
Aug 25 02:39:22 web1 sshd\[32357\]: Failed password for invalid user jasmin from 125.163.230.220 port 55782 ssh2
2019-08-25 22:47:51
36.232.133.81 attack
firewall-block, port(s): 23/tcp
2019-08-25 22:31:30
80.151.140.140 attack
Aug 25 08:31:45 smtp sshd[14424]: Invalid user PDV from 80.151.140.140 port 35847
Aug 25 08:31:45 smtp sshd[14424]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.151.140.140
Aug 25 08:31:45 smtp sshd[14424]: Invalid user PDV from 80.151.140.140 port 35847
Aug 25 08:31:46 smtp sshd[14424]: Failed password for invalid user PDV from 80.151.140.140 port 35847 ssh2
Aug 25 08:35:53 smtp sshd[14490]: Invalid user guest from 80.151.140.140 port 34807
...
2019-08-25 22:31:08
83.201.214.157 attackbotsspam
Automatic report - Port Scan Attack
2019-08-25 22:24:02
148.70.63.163 attack
Aug 24 23:47:28 hiderm sshd\[25626\]: Invalid user restart from 148.70.63.163
Aug 24 23:47:28 hiderm sshd\[25626\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.63.163
Aug 24 23:47:29 hiderm sshd\[25626\]: Failed password for invalid user restart from 148.70.63.163 port 43588 ssh2
Aug 24 23:53:29 hiderm sshd\[26121\]: Invalid user developer from 148.70.63.163
Aug 24 23:53:30 hiderm sshd\[26121\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=148.70.63.163
2019-08-25 22:25:50
23.28.50.172 attackbotsspam
MYH,DEF GET /admin/
2019-08-25 22:24:41
60.211.126.74 attack
Unauthorised access (Aug 25) SRC=60.211.126.74 LEN=40 TTL=49 ID=45896 TCP DPT=8080 WINDOW=46631 SYN
2019-08-25 22:58:14
186.139.166.114 attackspambots
SSH Brute-Force reported by Fail2Ban
2019-08-25 22:47:20
80.66.81.28 attackbotsspam
Aug 25 13:18:09 h2177944 sshd\[28843\]: Invalid user student10 from 80.66.81.28 port 47074
Aug 25 13:18:09 h2177944 sshd\[28843\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=80.66.81.28
Aug 25 13:18:11 h2177944 sshd\[28843\]: Failed password for invalid user student10 from 80.66.81.28 port 47074 ssh2
Aug 25 13:22:51 h2177944 sshd\[28938\]: Invalid user carter from 80.66.81.28 port 56324
...
2019-08-25 22:28:14
128.199.142.138 attackspambots
Aug 25 02:08:03 sachi sshd\[28988\]: Invalid user marcos from 128.199.142.138
Aug 25 02:08:03 sachi sshd\[28988\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.138
Aug 25 02:08:06 sachi sshd\[28988\]: Failed password for invalid user marcos from 128.199.142.138 port 43940 ssh2
Aug 25 02:14:25 sachi sshd\[29618\]: Invalid user zebra from 128.199.142.138
Aug 25 02:14:25 sachi sshd\[29618\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=128.199.142.138
2019-08-25 22:57:31
103.240.140.10 attackspam
Multiport scan : 8 ports scanned 243(x3) 244(x3) 245(x3) 246(x3) 247(x3) 248(x3) 249(x3) 250(x3)
2019-08-25 22:54:51
151.29.225.205 attackbots
Automatic report - Port Scan Attack
2019-08-25 23:04:59

Recently Reported IPs

187.59.31.63 124.62.84.7 29.192.76.223 141.11.127.26
174.11.26.5 67.107.147.92 233.66.121.135 155.90.36.11
95.167.9.1 141.144.195.102 181.163.175.112 155.23.181.225
55.196.192.125 43.135.144.118 4.91.181.46 9.77.99.130
144.177.248.48 75.165.170.135 185.174.216.198 56.205.15.211