Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 13.245.2.45
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 61811
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;13.245.2.45.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021900 1800 900 604800 86400

;; Query time: 42 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Feb 19 16:36:32 CST 2025
;; MSG SIZE  rcvd: 104
Host info
45.2.245.13.in-addr.arpa domain name pointer ec2-13-245-2-45.af-south-1.compute.amazonaws.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
45.2.245.13.in-addr.arpa	name = ec2-13-245-2-45.af-south-1.compute.amazonaws.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
183.89.190.204 attackbots
Honeypot attack, port: 445, PTR: mx-ll-183.89.190-204.dynamic.3bb.in.th.
2020-02-03 00:09:34
195.211.154.194 attackbots
Jan 12 20:27:31 ms-srv sshd[34057]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.211.154.194  user=root
Jan 12 20:27:34 ms-srv sshd[34057]: Failed password for invalid user root from 195.211.154.194 port 35314 ssh2
2020-02-03 00:05:38
195.228.231.150 attackspambots
Dec  6 05:40:27 ms-srv sshd[15680]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.228.231.150
Dec  6 05:40:30 ms-srv sshd[15680]: Failed password for invalid user user from 195.228.231.150 port 39536 ssh2
2020-02-02 23:53:00
195.225.229.214 attackspambots
Nov  3 02:18:15 ms-srv sshd[62864]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.225.229.214  user=root
Nov  3 02:18:17 ms-srv sshd[62864]: Failed password for invalid user root from 195.225.229.214 port 35860 ssh2
2020-02-02 23:55:31
195.24.207.199 attackspambots
Jan 15 05:30:54 ms-srv sshd[58887]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.24.207.199
Jan 15 05:30:56 ms-srv sshd[58887]: Failed password for invalid user dc++ from 195.24.207.199 port 48640 ssh2
2020-02-02 23:48:27
202.137.141.240 attackspam
DATE:2020-02-02 16:09:16, IP:202.137.141.240, PORT:1433 MSSQL brute force auth on honeypot server (honey-neo-dc)
2020-02-03 00:13:06
195.29.105.125 attackbots
Oct 24 13:29:37 ms-srv sshd[29607]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.29.105.125
Oct 24 13:29:39 ms-srv sshd[29607]: Failed password for invalid user ln from 195.29.105.125 port 39506 ssh2
2020-02-02 23:40:20
49.88.112.55 attackbots
k+ssh-bruteforce
2020-02-02 23:54:39
178.17.177.40 attackbots
WEB SPAM: Веб мастера
Создание сайтов, разработка web-приложений, верстка витрин магазина и еще тысячи
заказов по работе для тех, кто тесно связан с WEB-IT-сферой.
У нас всегда опубликованы только самые свежие и реальные объявления.
Всегда можно найти реальных клиентов тут , которые уже готовы заплатить за вашу работу - дело нескольких минут.! Создай свой бизнес и получите бесплатно тестовую подписку.
2020-02-03 00:17:54
124.207.50.178 attackbotsspam
Unauthorized connection attempt detected from IP address 124.207.50.178 to port 1433 [J]
2020-02-02 23:45:03
195.22.239.226 attack
Apr 27 12:05:40 ms-srv sshd[56901]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.22.239.226
Apr 27 12:05:41 ms-srv sshd[56901]: Failed password for invalid user demo from 195.22.239.226 port 33840 ssh2
2020-02-03 00:03:10
59.156.5.6 attackbots
Feb  2 15:27:55 thevastnessof sshd[30589]: Failed password for invalid user dev from 59.156.5.6 port 43218 ssh2
...
2020-02-03 00:01:51
195.223.211.242 attackbots
Dec 24 05:25:04 ms-srv sshd[53048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=195.223.211.242
Dec 24 05:25:06 ms-srv sshd[53048]: Failed password for invalid user test from 195.223.211.242 port 59186 ssh2
2020-02-02 23:58:52
31.207.33.67 attackbotsspam
Automatic report - XMLRPC Attack
2020-02-02 23:54:56
81.218.160.29 attackbots
Honeypot attack, port: 81, PTR: bzq-218-160-29.red.bezeqint.net.
2020-02-02 23:47:29

Recently Reported IPs

32.96.227.171 76.146.83.44 7.42.251.204 175.236.248.206
235.142.168.181 252.30.201.233 35.78.99.250 6.89.210.147
226.63.95.7 85.131.134.114 50.31.116.55 154.183.137.228
64.227.251.221 178.149.11.95 252.200.189.43 149.231.138.37
220.244.69.220 49.87.157.224 226.41.13.125 16.210.142.197