Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 57.65.48.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 10322
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;57.65.48.12.			IN	A

;; AUTHORITY SECTION:
.			29	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025011001 1800 900 604800 86400

;; Query time: 39 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 11 08:36:44 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 12.48.65.57.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.48.65.57.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.215.244 attack
Jun 21 15:31:00 lnxmail61 sshd[3251]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.215.244
2020-06-22 03:40:58
36.236.133.147 attackbotsspam
Port probing on unauthorized port 23
2020-06-22 03:33:06
13.78.29.8 attackbotsspam
spam (f2b h2)
2020-06-22 03:34:34
46.38.148.2 attack
2020-06-21 19:48:02 auth_plain authenticator failed for (User) [46.38.148.2]: 535 Incorrect authentication data (set_id=ax@csmailer.org)
2020-06-21 19:48:25 auth_plain authenticator failed for (User) [46.38.148.2]: 535 Incorrect authentication data (set_id=heron@csmailer.org)
2020-06-21 19:48:46 auth_plain authenticator failed for (User) [46.38.148.2]: 535 Incorrect authentication data (set_id=tumblr@csmailer.org)
2020-06-21 19:49:07 auth_plain authenticator failed for (User) [46.38.148.2]: 535 Incorrect authentication data (set_id=xray@csmailer.org)
2020-06-21 19:49:28 auth_plain authenticator failed for (User) [46.38.148.2]: 535 Incorrect authentication data (set_id=mds@csmailer.org)
...
2020-06-22 03:58:21
62.97.65.190 attackbotsspam
HTTP/80/443/8080 Probe, Hack -
2020-06-22 03:29:19
103.17.39.26 attackbotsspam
Invalid user shaonan from 103.17.39.26 port 59850
2020-06-22 03:46:56
222.186.175.151 attackbotsspam
Jun 21 21:12:29 ns3164893 sshd[23021]: Failed password for root from 222.186.175.151 port 26174 ssh2
Jun 21 21:12:32 ns3164893 sshd[23021]: Failed password for root from 222.186.175.151 port 26174 ssh2
...
2020-06-22 03:40:18
103.61.37.231 attackbots
Too many connections or unauthorized access detected from Arctic banned ip
2020-06-22 03:44:52
69.60.23.149 attackspam
Microsoft SQL Server User Authentication Brute Force Attempt , PTR: PTR record not found
2020-06-22 03:43:55
192.35.169.28 attackspam
 TCP (SYN) 192.35.169.28:7840 -> port 993, len 44
2020-06-22 03:45:29
49.233.87.146 attackbotsspam
Jun 21 15:20:14 journals sshd\[30022\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.87.146  user=mysql
Jun 21 15:20:16 journals sshd\[30022\]: Failed password for mysql from 49.233.87.146 port 64930 ssh2
Jun 21 15:23:42 journals sshd\[30336\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.87.146  user=root
Jun 21 15:23:43 journals sshd\[30336\]: Failed password for root from 49.233.87.146 port 56199 ssh2
Jun 21 15:27:13 journals sshd\[30648\]: Invalid user hy from 49.233.87.146
Jun 21 15:27:13 journals sshd\[30648\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.233.87.146
...
2020-06-22 03:38:02
211.39.149.53 attack
(sshd) Failed SSH login from 211.39.149.53 (KR/South Korea/-): 5 in the last 3600 secs
2020-06-22 03:30:36
158.69.197.113 attackspambots
*Port Scan* detected from 158.69.197.113 (CA/Canada/Quebec/Montreal (Ville-Marie)/113.ip-158-69-197.net). 4 hits in the last 115 seconds
2020-06-22 03:54:14
193.56.28.103 attackbots
2020-06-19 08:59:03 no host name found for IP address 193.56.28.103
2020-06-19 09:00:43 no host name found for IP address 193.56.28.103
2020-06-19 09:02:32 no host name found for IP address 193.56.28.103
2020-06-19 09:04:28 no host name found for IP address 193.56.28.103
2020-06-19 09:06:28 no host name found for IP address 193.56.28.103
2020-06-19 09:08:34 no host name found for IP address 193.56.28.103
2020-06-19 09:10:43 no host name found for IP address 193.56.28.103
2020-06-19 09:12:54 no host name found for IP address 193.56.28.103
2020-06-19 09:15:05 no host name found for IP address 193.56.28.103
2020-06-19 09:17:17 no host name found for IP address 193.56.28.103
2020-06-19 09:19:31 no host name found for IP address 193.56.28.103
2020-06-19 09:21:44 no host name found for IP address 193.56.28.103
2020-06-19 09:23:56 no host name found for IP address 193.56.28.103
2020-06-19 09:26:09 no host name found for IP address 193.56.28.103
2020-06-19 09:28:20 no host name ........
------------------------------
2020-06-22 03:44:23
158.69.194.115 attackbots
Jun 21 08:09:56 mail sshd\[31018\]: Invalid user ftpuser from 158.69.194.115
Jun 21 08:09:56 mail sshd\[31018\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=158.69.194.115
...
2020-06-22 03:37:46

Recently Reported IPs

137.248.118.134 31.177.252.85 170.65.218.180 202.106.72.125
54.131.79.147 65.42.86.65 194.232.160.35 56.13.85.133
251.134.141.147 18.52.143.40 131.239.65.119 42.162.207.51
75.196.69.220 222.93.223.174 29.174.130.140 99.202.2.202
247.191.197.13 148.195.95.214 46.186.104.115 94.246.222.197