Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.149.94.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 62595
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;12.149.94.245.			IN	A

;; AUTHORITY SECTION:
.			277	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022020700 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 07 21:23:24 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 245.94.149.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 245.94.149.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
184.105.247.242 attack
scan r
2019-09-07 10:14:10
193.32.163.44 attackspambots
09/06/2019-20:43:41.773856 193.32.163.44 Protocol: 6 ET SCAN NMAP -sS window 1024
2019-09-07 10:37:01
185.53.88.70 attackspambots
\[2019-09-06 21:36:11\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-06T21:36:11.419-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011441217900519",SessionID="0x7fd9a819fa08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.70/54667",ACLName="no_extension_match"
\[2019-09-06 21:37:24\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-06T21:37:24.064-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="9011970599704264",SessionID="0x7fd9a819fa08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.70/53118",ACLName="no_extension_match"
\[2019-09-06 21:38:58\] SECURITY\[1849\] res_security_log.c: SecurityEvent="FailedACL",EventTV="2019-09-06T21:38:58.540-0400",Severity="Error",Service="SIP",EventVersion="1",AccountID="019090441174090603",SessionID="0x7fd9a819fa08",LocalAddress="IPV4/UDP/192.168.244.6/5060",RemoteAddress="IPV4/UDP/185.53.88.70/51235",ACLName="no_e
2019-09-07 10:02:21
191.53.251.108 attack
Sep  6 20:43:31 web1 postfix/smtpd[31176]: warning: unknown[191.53.251.108]: SASL PLAIN authentication failed: authentication failure
...
2019-09-07 10:43:56
103.92.84.102 attack
Sep  7 03:59:32 meumeu sshd[26325]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.84.102 
Sep  7 03:59:34 meumeu sshd[26325]: Failed password for invalid user temp from 103.92.84.102 port 43816 ssh2
Sep  7 04:03:38 meumeu sshd[27072]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=103.92.84.102 
...
2019-09-07 10:17:15
201.66.60.66 attack
../../mnt/custom/ProductDefinition
2019-09-07 10:13:42
207.46.13.46 attackbots
Automatic report - Banned IP Access
2019-09-07 10:42:01
157.230.146.88 attackspambots
Sep  7 05:18:55 tuotantolaitos sshd[16098]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.230.146.88
Sep  7 05:18:58 tuotantolaitos sshd[16098]: Failed password for invalid user 12345 from 157.230.146.88 port 59372 ssh2
...
2019-09-07 10:28:18
45.125.239.95 attackspambots
RDP Brute-Force (Grieskirchen RZ1)
2019-09-07 10:46:37
218.98.26.163 attack
Sep  7 02:38:25 *** sshd[11732]: User root from 218.98.26.163 not allowed because not listed in AllowUsers
2019-09-07 10:40:31
139.199.113.140 attack
Sep  6 15:46:26 eddieflores sshd\[14318\]: Invalid user deploy from 139.199.113.140
Sep  6 15:46:26 eddieflores sshd\[14318\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.113.140
Sep  6 15:46:29 eddieflores sshd\[14318\]: Failed password for invalid user deploy from 139.199.113.140 port 59624 ssh2
Sep  6 15:51:54 eddieflores sshd\[14758\]: Invalid user odoo from 139.199.113.140
Sep  6 15:51:54 eddieflores sshd\[14758\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=139.199.113.140
2019-09-07 10:01:55
218.98.26.172 attackbots
Sep  7 04:33:31 ArkNodeAT sshd\[15055\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.172  user=root
Sep  7 04:33:33 ArkNodeAT sshd\[15055\]: Failed password for root from 218.98.26.172 port 56594 ssh2
Sep  7 04:33:46 ArkNodeAT sshd\[15071\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.98.26.172  user=root
2019-09-07 10:38:17
178.204.196.1 attackbotsspam
Automatic report - Port Scan Attack
2019-09-07 10:08:06
182.73.123.118 attackbotsspam
Sep  6 15:54:12 wbs sshd\[5283\]: Invalid user steam from 182.73.123.118
Sep  6 15:54:12 wbs sshd\[5283\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118
Sep  6 15:54:15 wbs sshd\[5283\]: Failed password for invalid user steam from 182.73.123.118 port 17233 ssh2
Sep  6 15:58:55 wbs sshd\[5660\]: Invalid user vncuser from 182.73.123.118
Sep  6 15:58:55 wbs sshd\[5660\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.73.123.118
2019-09-07 10:16:27
141.98.9.205 attackspam
Sep  7 03:47:40 relay postfix/smtpd\[19439\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 03:47:48 relay postfix/smtpd\[29413\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 03:48:33 relay postfix/smtpd\[32067\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 03:48:41 relay postfix/smtpd\[32127\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep  7 03:49:26 relay postfix/smtpd\[28738\]: warning: unknown\[141.98.9.205\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-09-07 09:51:37

Recently Reported IPs

211.46.179.219 190.94.141.12 193.233.156.17 184.105.133.1
46.8.174.170 123.240.157.153 59.151.222.189 93.94.220.83
202.124.229.232 165.73.224.130 193.163.125.227 177.11.191.210
109.111.152.30 222.253.86.220 113.22.40.41 120.25.194.50
120.85.94.255 138.117.180.70 137.184.221.114 40.92.89.34