Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 158.82.145.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 31085
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;158.82.145.12.			IN	A

;; AUTHORITY SECTION:
.			331	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022072202 1800 900 604800 86400

;; Query time: 60 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jul 23 06:46:41 CST 2022
;; MSG SIZE  rcvd: 106
Host info
Host 12.145.82.158.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.145.82.158.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
217.182.70.150 attackspam
20 attempts against mh-ssh on echoip
2020-06-10 04:21:12
104.236.36.11 attackspambots
Automatic report - XMLRPC Attack
2020-06-10 03:56:25
113.53.230.34 attackbotsspam
" "
2020-06-10 03:51:09
159.65.174.81 attackbots
firewall-block, port(s): 26674/tcp
2020-06-10 04:13:17
183.89.94.137 attack
1591704062 - 06/09/2020 14:01:02 Host: 183.89.94.137/183.89.94.137 Port: 445 TCP Blocked
2020-06-10 04:19:14
103.69.88.51 attackspam
 TCP (SYN) 103.69.88.51:59932 -> port 445, len 52
2020-06-10 03:50:56
115.56.125.232 attackspam
 TCP (SYN) 115.56.125.232:1624 -> port 23, len 44
2020-06-10 04:11:33
112.35.90.128 attack
Jun  9 14:17:30 fhem-rasp sshd[5310]: Connection closed by 112.35.90.128 port 50870 [preauth]
...
2020-06-10 04:19:55
182.50.130.133 attackspam
Attempts to probe web pages for vulnerable PHP or other applications
2020-06-10 04:07:46
47.240.242.19 attackspam
WordPress brute force
2020-06-10 04:27:56
181.123.10.221 attackbotsspam
Invalid user xv from 181.123.10.221 port 58532
2020-06-10 03:58:21
212.83.131.86 attackspambots
port scanning
2020-06-10 03:53:56
113.99.127.190 attackspambots
bruteforce detected
2020-06-10 04:09:08
79.100.43.45 attackbotsspam
Unauthorized connection attempt from IP address 79.100.43.45 on Port 445(SMB)
2020-06-10 04:20:41
218.17.185.31 attackspam
Jun  9 15:01:56 * sshd[32204]: Failed password for root from 218.17.185.31 port 39626 ssh2
Jun  9 15:02:50 * sshd[32313]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.17.185.31
2020-06-10 03:58:08

Recently Reported IPs

158.80.33.3 158.80.204.131 158.80.252.186 158.80.43.202
158.81.114.63 158.81.138.91 158.80.253.182 158.80.87.196
158.86.175.215 158.83.187.105 158.80.154.51 158.80.192.234
158.8.79.25 158.80.53.10 158.80.177.189 158.82.1.103
158.80.111.175 158.80.128.15 158.80.79.131 158.8.165.242