Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: India

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 65.2.48.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7683
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;65.2.48.80.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025020901 1800 900 604800 86400

;; Query time: 14 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 10 08:56:39 CST 2025
;; MSG SIZE  rcvd: 103
Host info
80.48.2.65.in-addr.arpa domain name pointer ec2-65-2-48-80.ap-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.48.2.65.in-addr.arpa	name = ec2-65-2-48-80.ap-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
148.70.84.101 attackbotsspam
2019-06-24T14:05:57.808161abusebot-7.cloudsearch.cf sshd\[6120\]: Invalid user backup from 148.70.84.101 port 46870
2019-06-25 02:13:44
93.205.82.45 attack
fraudulent SSH attempt
2019-06-25 02:36:02
193.188.22.12 attackbots
Jun 24 11:26:21 server1 sshd\[20537\]: Invalid user ubnt from 193.188.22.12
Jun 24 11:26:21 server1 sshd\[20537\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.12 
Jun 24 11:26:23 server1 sshd\[20537\]: Failed password for invalid user ubnt from 193.188.22.12 port 10023 ssh2
Jun 24 11:26:24 server1 sshd\[20555\]: Invalid user Admin from 193.188.22.12
Jun 24 11:26:24 server1 sshd\[20555\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.188.22.12 
...
2019-06-25 02:31:56
143.208.138.86 attackbotsspam
failed_logins
2019-06-25 02:29:13
177.184.240.55 attackspambots
failed_logins
2019-06-25 02:33:58
177.155.94.7 attackbotsspam
Invalid user admin from 177.155.94.7 port 58375
2019-06-25 02:40:48
178.128.73.191 attackbotsspam
ssh bruteforce or scan
...
2019-06-25 02:33:28
2.182.57.122 attackbotsspam
IP: 2.182.57.122
ASN: AS58224 Iran Telecommunication Company PJS
Port: Simple Mail Transfer 25
Found in one or more Blacklists
Date: 24/06/2019 12:00:35 PM UTC
2019-06-25 02:14:56
188.165.44.214 attackbotsspam
Invalid user squ1sh from 188.165.44.214 port 29913
2019-06-25 02:32:13
210.56.63.119 attackbotsspam
SMB Server BruteForce Attack
2019-06-25 02:16:44
91.236.116.214 attackspambots
Invalid user 0 from 91.236.116.214 port 7610
2019-06-25 02:48:48
159.65.147.154 attackspam
fraudulent SSH attempt
2019-06-25 02:24:13
138.68.146.186 attackbots
Jun 24 17:07:45 XXX sshd[1481]: Invalid user jboss from 138.68.146.186 port 39328
2019-06-25 02:43:35
109.70.100.23 spambotsattackproxynormal
ddos and vpn
2019-06-25 02:26:25
73.246.30.134 attackspambots
Invalid user oracle from 73.246.30.134 port 42268
2019-06-25 02:52:03

Recently Reported IPs

243.2.213.153 207.208.151.212 159.209.174.220 81.136.7.35
109.141.189.88 140.125.17.17 60.60.124.218 195.126.220.57
118.91.161.206 210.210.94.125 64.19.66.108 146.154.103.97
156.216.82.41 174.226.165.85 86.221.122.71 14.134.90.234
51.217.173.139 180.183.145.48 129.234.29.189 137.186.19.155