Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Ortonville

Region: Michigan

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 12.219.232.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 18795
;; flags: qr rd ra ad; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;12.219.232.45.			IN	A

;; AUTHORITY SECTION:
.			3600	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019071501 1800 900 604800 86400

;; Query time: 3 msec
;; SERVER: 67.207.67.2#53(67.207.67.2)
;; WHEN: Tue Jul 16 07:13:02 CST 2019
;; MSG SIZE  rcvd: 117
Host info
Host 45.232.219.12.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		67.207.67.2
Address:	67.207.67.2#53

** server can't find 45.232.219.12.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
65.49.20.68 attackspam
Unauthorized connection attempt detected from IP address 65.49.20.68 to port 22 [T]
2020-07-10 15:59:59
103.131.71.47 attack
(mod_security) mod_security (id:212280) triggered by 103.131.71.47 (VN/Vietnam/bot-103-131-71-47.coccoc.com): 5 in the last 3600 secs
2020-07-10 15:46:52
134.175.228.215 attackspambots
2020-07-10T06:50:30.760869afi-git.jinr.ru sshd[18643]: Invalid user cyril from 134.175.228.215 port 50188
2020-07-10T06:50:30.763919afi-git.jinr.ru sshd[18643]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=134.175.228.215
2020-07-10T06:50:30.760869afi-git.jinr.ru sshd[18643]: Invalid user cyril from 134.175.228.215 port 50188
2020-07-10T06:50:32.793241afi-git.jinr.ru sshd[18643]: Failed password for invalid user cyril from 134.175.228.215 port 50188 ssh2
2020-07-10T06:52:40.232632afi-git.jinr.ru sshd[19565]: Invalid user kohi from 134.175.228.215 port 45956
...
2020-07-10 16:18:58
14.160.38.34 attackspam
'IP reached maximum auth failures for a one day block'
2020-07-10 15:59:13
219.84.106.189 attack
Port probing on unauthorized port 88
2020-07-10 15:48:38
193.35.51.13 attackbotsspam
Time:     Fri Jul 10 04:48:46 2020 -0300
IP:       193.35.51.13 (RU/Russia/-)
Failures: 5 (smtpauth)
Interval: 3600 seconds
Blocked:  Permanent Block
2020-07-10 16:05:11
49.144.183.64 attack
49.144.183.64 - - [10/Jul/2020:05:50:55 +0200] "POST /xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
49.144.183.64 - - [10/Jul/2020:05:52:42 +0200] "POST /xmlrpc.php HTTP/1.1" 301 162 "-" "Mozilla/4.0 (compatible; MSIE 6.0; Windows NT 5.0)"
...
2020-07-10 16:16:32
106.53.219.82 attackbots
Jul 10 08:21:22 web-main sshd[434958]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.53.219.82 
Jul 10 08:21:22 web-main sshd[434958]: Invalid user upload from 106.53.219.82 port 52444
Jul 10 08:21:24 web-main sshd[434958]: Failed password for invalid user upload from 106.53.219.82 port 52444 ssh2
2020-07-10 16:01:05
175.145.102.254 attackbots
2020-07-10T08:01:09.356355shield sshd\[17177\]: Invalid user xiaolian from 175.145.102.254 port 32029
2020-07-10T08:01:09.365529shield sshd\[17177\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.145.102.254
2020-07-10T08:01:11.659120shield sshd\[17177\]: Failed password for invalid user xiaolian from 175.145.102.254 port 32029 ssh2
2020-07-10T08:04:34.158901shield sshd\[17536\]: Invalid user upload from 175.145.102.254 port 42087
2020-07-10T08:04:34.167047shield sshd\[17536\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=175.145.102.254
2020-07-10 16:14:49
191.101.46.11 attack
Jul 10 04:07:11 logopedia-1vcpu-1gb-nyc1-01 sshd[105082]: Invalid user yangqy from 191.101.46.11 port 34624
...
2020-07-10 16:07:21
186.93.52.249 attackbotsspam
Automatic report - XMLRPC Attack
2020-07-10 16:06:36
79.137.72.121 attack
Jul 10 06:50:32 plex-server sshd[1170942]: Invalid user dorms from 79.137.72.121 port 54084
Jul 10 06:50:32 plex-server sshd[1170942]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.137.72.121 
Jul 10 06:50:32 plex-server sshd[1170942]: Invalid user dorms from 79.137.72.121 port 54084
Jul 10 06:50:34 plex-server sshd[1170942]: Failed password for invalid user dorms from 79.137.72.121 port 54084 ssh2
Jul 10 06:53:52 plex-server sshd[1171271]: Invalid user giuliana from 79.137.72.121 port 50468
...
2020-07-10 16:06:55
60.167.176.219 attackbotsspam
Failed password for invalid user bomb from 60.167.176.219 port 37224 ssh2
2020-07-10 16:03:27
121.160.139.118 attackspambots
Jul 10 08:39:32 hosting sshd[9101]: Invalid user centos from 121.160.139.118 port 36926
...
2020-07-10 15:55:14
159.65.196.65 attackspam
Jul 10 09:33:30 vps sshd[716514]: Failed password for invalid user testuser from 159.65.196.65 port 38610 ssh2
Jul 10 09:36:48 vps sshd[734131]: Invalid user nikkia from 159.65.196.65 port 35858
Jul 10 09:36:48 vps sshd[734131]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=159.65.196.65
Jul 10 09:36:51 vps sshd[734131]: Failed password for invalid user nikkia from 159.65.196.65 port 35858 ssh2
Jul 10 09:40:25 vps sshd[754287]: Invalid user cyborg from 159.65.196.65 port 33106
...
2020-07-10 15:52:49

Recently Reported IPs

64.161.160.240 205.149.75.218 218.61.16.142 101.15.6.145
140.255.114.128 79.103.164.149 113.236.88.108 14.161.11.225
115.139.235.55 162.62.19.137 11.116.133.184 14.127.126.144
102.177.158.46 66.254.54.83 24.219.43.162 89.72.184.73
134.73.161.129 173.49.207.222 112.246.51.32 189.47.19.69