Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
157.245.122.248 attack
$f2bV_matches
2020-06-01 12:41:53
157.245.122.248 attackbotsspam
Invalid user amavis from 157.245.122.248 port 41934
2020-05-29 14:08:57
157.245.122.248 attackbots
May 26 02:27:25 cdc sshd[32409]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.122.248 
May 26 02:27:27 cdc sshd[32409]: Failed password for invalid user ubuntu from 157.245.122.248 port 48698 ssh2
2020-05-26 12:30:27
157.245.122.248 attackspam
May 24 18:28:31 s158375 sshd[27434]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.122.248
2020-05-25 07:32:53
157.245.122.248 attackspambots
May 15 14:43:18 haigwepa sshd[14289]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.122.248 
May 15 14:43:20 haigwepa sshd[14289]: Failed password for invalid user testuser from 157.245.122.248 port 60482 ssh2
...
2020-05-15 23:11:43
157.245.122.248 attackspambots
Invalid user user from 157.245.122.248 port 39838
2020-05-15 14:29:46
157.245.122.248 attackspam
2020-05-07T20:17:03.375142abusebot-7.cloudsearch.cf sshd[5402]: Invalid user elias from 157.245.122.248 port 54842
2020-05-07T20:17:03.381658abusebot-7.cloudsearch.cf sshd[5402]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.122.248
2020-05-07T20:17:03.375142abusebot-7.cloudsearch.cf sshd[5402]: Invalid user elias from 157.245.122.248 port 54842
2020-05-07T20:17:05.140174abusebot-7.cloudsearch.cf sshd[5402]: Failed password for invalid user elias from 157.245.122.248 port 54842 ssh2
2020-05-07T20:23:22.557009abusebot-7.cloudsearch.cf sshd[5760]: Invalid user teamspeak from 157.245.122.248 port 42112
2020-05-07T20:23:22.564915abusebot-7.cloudsearch.cf sshd[5760]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=157.245.122.248
2020-05-07T20:23:22.557009abusebot-7.cloudsearch.cf sshd[5760]: Invalid user teamspeak from 157.245.122.248 port 42112
2020-05-07T20:23:25.020946abusebot-7.cloudsearch.cf sshd
...
2020-05-08 06:33:52
157.245.122.30 attack
fail2ban honeypot
2019-11-08 07:22:48
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 157.245.122.80
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 56294
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;157.245.122.80.			IN	A

;; AUTHORITY SECTION:
.			191	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022022701 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Feb 28 05:03:06 CST 2022
;; MSG SIZE  rcvd: 107
Host info
80.122.245.157.in-addr.arpa domain name pointer do-binom.prokit.me.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
80.122.245.157.in-addr.arpa	name = do-binom.prokit.me.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
113.210.123.118 attack
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:17:02
112.27.128.13 attackbotsspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:51:31
112.78.43.58 attackspambots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:48:30
113.210.99.107 attackbots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:22:10
112.26.82.61 attackbotsspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:52:17
113.210.99.53 attack
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:22:27
112.101.80.250 attackspambots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:45:51
113.210.199.137 attack
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:08:04
112.198.137.170 attackspambots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:42:54
113.210.56.123 attack
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:27:04
113.140.48.156 attackspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:37:47
112.218.73.138 attackspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:41:47
113.53.29.88 attackbots
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:35:25
113.210.103.149 attack
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:21:46
112.113.241.17 attackspam
"Account brute force using dictionary attack against Exchange Online"
2019-08-06 04:45:15

Recently Reported IPs

157.245.125.69 157.245.129.21 157.245.127.104 157.245.137.244
157.245.141.48 157.245.127.173 157.245.140.16 157.245.147.79
157.245.153.71 157.245.151.12 157.245.159.216 157.245.163.255
157.245.163.3 157.245.164.162 157.245.174.114 157.245.183.169
157.245.185.148 157.245.178.128 157.245.194.204 157.245.195.73