Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Chicago

Region: Illinois

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 11.245.12.153
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 23151
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;11.245.12.153.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019091501 1800 900 604800 86400

;; Query time: 2 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Mon Sep 16 10:59:08 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 153.12.245.11.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 153.12.245.11.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
103.248.116.34 attack
Unauthorized connection attempt from IP address 103.248.116.34 on Port 445(SMB)
2020-03-30 21:24:21
182.155.72.32 attack
Attempted connection to port 2323.
2020-03-30 20:55:24
194.59.165.210 attack
Brute force SMTP login attempted.
...
2020-03-30 21:14:39
106.12.10.21 attackbots
Mar 30 13:43:00 sigma sshd\[4801\]: Failed password for root from 106.12.10.21 port 54762 ssh2Mar 30 13:47:26 sigma sshd\[4851\]: Invalid user hjh from 106.12.10.21
...
2020-03-30 21:13:07
106.12.219.16 attack
Web App Attack
2020-03-30 21:07:03
187.177.120.155 attackbots
Automatic report - Port Scan Attack
2020-03-30 21:15:45
200.233.204.145 attack
Mar 30 18:21:41 our-server-hostname sshd[15414]: reveeclipse mapping checking getaddrinfo for 200-233-204-145.dynamic.idial.com.br [200.233.204.145] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar 30 18:21:41 our-server-hostname sshd[15414]: Invalid user ueu from 200.233.204.145
Mar 30 18:21:41 our-server-hostname sshd[15414]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.233.204.145 
Mar 30 18:21:43 our-server-hostname sshd[15414]: Failed password for invalid user ueu from 200.233.204.145 port 20412 ssh2
Mar 30 18:27:10 our-server-hostname sshd[16145]: reveeclipse mapping checking getaddrinfo for 200-233-204-145.dynamic.idial.com.br [200.233.204.145] failed - POSSIBLE BREAK-IN ATTEMPT!
Mar 30 18:27:10 our-server-hostname sshd[16145]: Invalid user pietre from 200.233.204.145
Mar 30 18:27:10 our-server-hostname sshd[16145]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.233.204.145 
Mar 30........
-------------------------------
2020-03-30 21:39:28
45.6.72.17 attackbots
Mar 30 14:42:56 vpn01 sshd[12681]: Failed password for root from 45.6.72.17 port 54628 ssh2
...
2020-03-30 20:57:53
222.254.0.109 attackbots
Unauthorized connection attempt from IP address 222.254.0.109 on Port 445(SMB)
2020-03-30 21:31:34
46.105.100.224 attackspambots
ENG,WP GET /wp-login.php
2020-03-30 21:05:05
139.199.209.89 attack
Mar 30 14:42:46 DAAP sshd[8461]: Invalid user test from 139.199.209.89 port 54362
Mar 30 14:42:46 DAAP sshd[8461]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.209.89
Mar 30 14:42:46 DAAP sshd[8461]: Invalid user test from 139.199.209.89 port 54362
Mar 30 14:42:49 DAAP sshd[8461]: Failed password for invalid user test from 139.199.209.89 port 54362 ssh2
Mar 30 14:45:40 DAAP sshd[8494]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.209.89  user=root
Mar 30 14:45:42 DAAP sshd[8494]: Failed password for root from 139.199.209.89 port 55578 ssh2
...
2020-03-30 21:20:16
47.247.152.67 attackspambots
Unauthorized connection attempt from IP address 47.247.152.67 on Port 445(SMB)
2020-03-30 21:13:47
190.94.3.203 attackspambots
Unauthorized connection attempt from IP address 190.94.3.203 on Port 445(SMB)
2020-03-30 21:38:20
185.53.88.49 attack
[2020-03-30 09:21:40] NOTICE[1148][C-00018fcc] chan_sip.c: Call from '' (185.53.88.49:5076) to extension '9011972595897084' rejected because extension not found in context 'public'.
[2020-03-30 09:21:40] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-30T09:21:40.515-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011972595897084",SessionID="0x7fd82c530768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.49/5076",ACLName="no_extension_match"
[2020-03-30 09:22:49] NOTICE[1148][C-00018fce] chan_sip.c: Call from '' (185.53.88.49:5070) to extension '5011972595897084' rejected because extension not found in context 'public'.
[2020-03-30 09:22:49] SECURITY[1163] res_security_log.c: SecurityEvent="FailedACL",EventTV="2020-03-30T09:22:49.592-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="5011972595897084",SessionID="0x7fd82c530768",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/18
...
2020-03-30 21:24:58
194.50.254.170 attackspam
Brute force SMTP login attempted.
...
2020-03-30 21:21:55

Recently Reported IPs

170.106.84.83 172.223.157.192 49.83.139.122 32.134.72.111
88.244.108.204 60.184.246.194 211.199.232.216 159.203.201.124
191.133.88.80 96.167.212.163 159.65.12.136 113.31.111.147
175.6.133.182 194.113.94.207 83.167.87.198 76.94.220.247
69.182.111.176 27.37.16.48 167.71.11.129 45.76.135.106