Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: China

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 111.12.220.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 3241
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;111.12.220.45.			IN	A

;; AUTHORITY SECTION:
.			247	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024020800 1800 900 604800 86400

;; Query time: 23 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 09 00:23:32 CST 2024
;; MSG SIZE  rcvd: 106
Host info
Host 45.220.12.111.in-addr.arpa not found: 2(SERVFAIL)
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 45.220.12.111.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
218.164.110.214 attackspam
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 03:06:20
211.252.87.37 attackspambots
Mar 12 19:49:13 ift sshd\[25170\]: Invalid user daniel from 211.252.87.37Mar 12 19:49:16 ift sshd\[25170\]: Failed password for invalid user daniel from 211.252.87.37 port 42734 ssh2Mar 12 19:52:58 ift sshd\[25693\]: Failed password for root from 211.252.87.37 port 41584 ssh2Mar 12 19:56:42 ift sshd\[26349\]: Invalid user asterisk from 211.252.87.37Mar 12 19:56:44 ift sshd\[26349\]: Failed password for invalid user asterisk from 211.252.87.37 port 40412 ssh2
...
2020-03-13 03:09:05
61.147.2.10 attackbots
2020-02-21T02:02:53.410Z CLOSE host=61.147.2.10 port=59885 fd=4 time=20.017 bytes=21
...
2020-03-13 02:39:53
63.81.87.140 attackspam
Mar 12 13:47:08 mail.srvfarm.net postfix/smtpd[1811060]: NOQUEUE: reject: RCPT from unknown[63.81.87.140]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 13:47:08 mail.srvfarm.net postfix/smtpd[1830689]: NOQUEUE: reject: RCPT from unknown[63.81.87.140]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 13:47:08 mail.srvfarm.net postfix/smtpd[1830650]: NOQUEUE: reject: RCPT from unknown[63.81.87.140]: 450 4.1.8 : Sender address rejected: Domain not found; from= to= proto=ESMTP helo=
Mar 12 13:47:08 mail.srvfarm.net postfix/smtpd[1827922]: NOQUEUE: reject: RCPT from unknown[63.81.87.140]: 450 4.1.8 
2020-03-13 03:03:24
5.178.76.246 attackspam
2020-02-04T10:13:19.839Z CLOSE host=5.178.76.246 port=34790 fd=4 time=20.013 bytes=16
...
2020-03-13 03:18:24
54.38.92.35 attack
2019-12-17T06:32:14.984Z CLOSE host=54.38.92.35 port=60000 fd=4 time=40.041 bytes=33
...
2020-03-13 02:59:38
61.153.54.38 attack
'IP reached maximum auth failures for a one day block'
2020-03-13 02:56:51
209.85.220.69 attackspambots
Received: from mail-sor-f69.google.com (mail-sor-f69.google.com. [209.85.220.69])
        by mx.google.com with SMTPS id q1sor5408914plr.16.2020.03.12.00.40.11
        for 
        (Google Transport Security);
        Thu, 12 Mar 2020 00:40:11 -0700 (PDT)


12voltvids just uploaded a video
Panasonic DVD S35 No Playback repair
http://www.youtube.com/watch?v=4T61lpAOHnA&feature=em-uploademail

https://www.abuseipdb.com/check/209.85.220.69
Dave McDonald / Sharon McDonald
(604)-200-1675
(604) 943-0664
(604) 724-5343
(604) 806-4602
1361 Compston Crescent
Delta
Vancouver British Columbia
IP number 205.250.57.86  Telus Broadband/cable/fiber
volt@telus.net
2020-03-13 03:18:57
185.175.93.17 attack
03/12/2020-12:02:55.561782 185.175.93.17 Protocol: 6 ET DROP Dshield Block Listed Source group 1
2020-03-13 02:58:36
195.158.8.206 attack
(sshd) Failed SSH login from 195.158.8.206 (UZ/Uzbekistan/-): 2 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Mar 12 19:16:12 ubnt-55d23 sshd[500]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.158.8.206  user=root
Mar 12 19:16:13 ubnt-55d23 sshd[500]: Failed password for root from 195.158.8.206 port 34058 ssh2
2020-03-13 03:17:10
211.75.136.205 attack
Telnet/23 MH Probe, Scan, BF, Hack -
2020-03-13 03:00:44
18.220.183.151 attack
Wordpress attack
2020-03-13 02:40:15
196.246.200.192 attackspambots
Mar 12 19:28:35 lcl-usvr-02 sshd[5154]: Invalid user admin from 196.246.200.192 port 59054
Mar 12 19:28:35 lcl-usvr-02 sshd[5154]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=196.246.200.192
Mar 12 19:28:35 lcl-usvr-02 sshd[5154]: Invalid user admin from 196.246.200.192 port 59054
Mar 12 19:28:37 lcl-usvr-02 sshd[5154]: Failed password for invalid user admin from 196.246.200.192 port 59054 ssh2
Mar 12 19:28:51 lcl-usvr-02 sshd[5165]: Invalid user admin from 196.246.200.192 port 59330
...
2020-03-13 03:16:51
58.211.122.66 attack
Unauthorized connection attempt detected from IP address 58.211.122.66 to port 22 [T]
2020-03-13 02:57:10
59.96.24.47 attack
2020-01-27T00:34:28.147Z CLOSE host=59.96.24.47 port=63611 fd=4 time=20.020 bytes=22
2020-01-27T00:34:28.185Z CLOSE host=59.96.24.47 port=63684 fd=5 time=20.000 bytes=21
...
2020-03-13 02:44:46

Recently Reported IPs

111.119.253.211 111.119.4.53 111.119.3.73 111.119.82.33
111.12.147.174 111.119.62.93 111.12.197.83 111.12.108.22
111.120.109.80 111.119.85.217 111.12.112.14 111.119.99.131
111.119.57.12 111.119.46.113 111.119.238.173 111.119.247.238
111.119.204.11 111.119.240.136 111.119.20.58 111.119.219.168