Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: South Africa

Internet Service Provider: Telkom

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 165.145.204.212
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 6654
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;165.145.204.212.		IN	A

;; AUTHORITY SECTION:
.			484	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2023012100 1800 900 604800 86400

;; Query time: 20 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Jan 21 15:48:16 CST 2023
;; MSG SIZE  rcvd: 108
Host info
212.204.145.165.in-addr.arpa domain name pointer dsl-165-145-204-212.telkomadsl.co.za.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
212.204.145.165.in-addr.arpa	name = dsl-165-145-204-212.telkomadsl.co.za.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
104.40.95.185 attackbots
SSH / Telnet Brute Force Attempts on Honeypot
2020-02-01 10:25:14
186.88.53.167 attackbotsspam
Unauthorized connection attempt from IP address 186.88.53.167 on Port 445(SMB)
2020-02-01 10:15:28
212.156.221.69 attackspambots
Unauthorized connection attempt detected from IP address 212.156.221.69 to port 2220 [J]
2020-02-01 10:35:32
199.195.252.209 attackbots
slow and persistent scanner
2020-02-01 10:33:44
43.229.90.69 attackbots
Unauthorized connection attempt from IP address 43.229.90.69 on Port 445(SMB)
2020-02-01 10:42:27
212.98.92.23 attackspambots
212.98.92.23 - - \[01/Feb/2020:02:37:07 +0100\] "POST /wp-login.php HTTP/1.0" 200 6597 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
212.98.92.23 - - \[01/Feb/2020:02:37:08 +0100\] "POST /wp-login.php HTTP/1.0" 200 6410 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
212.98.92.23 - - \[01/Feb/2020:02:37:09 +0100\] "POST /xmlrpc.php HTTP/1.0" 200 736 "-" "Mozilla/5.0 \(X11\; Ubuntu\; Linux x86_64\; rv:62.0\) Gecko/20100101 Firefox/62.0"
2020-02-01 10:24:57
115.150.211.72 attackspam
Unauthorized connection attempt from IP address 115.150.211.72 on Port 445(SMB)
2020-02-01 10:15:13
41.41.10.13 attackspambots
Unauthorized connection attempt from IP address 41.41.10.13 on Port 445(SMB)
2020-02-01 10:30:00
157.55.39.8 attackbots
Automatic report - Banned IP Access
2020-02-01 10:07:17
143.159.219.72 attackspambots
detected by Fail2Ban
2020-02-01 10:21:43
41.38.145.242 attack
Unauthorized connection attempt from IP address 41.38.145.242 on Port 445(SMB)
2020-02-01 10:23:35
200.11.140.62 attack
Unauthorized connection attempt from IP address 200.11.140.62 on Port 445(SMB)
2020-02-01 10:43:42
91.134.142.57 attack
$f2bV_matches
2020-02-01 10:35:01
149.56.100.237 attackbotsspam
Unauthorized connection attempt detected from IP address 149.56.100.237 to port 2220 [J]
2020-02-01 10:19:03
181.164.15.200 attackbots
Fail2Ban Ban Triggered
2020-02-01 10:45:52

Recently Reported IPs

166.180.207.248 165.146.196.119 162.33.236.241 160.81.115.217
160.133.68.145 16.194.103.11 43.18.194.17 159.155.252.47
177.98.100.111 17.144.119.159 243.151.64.108 233.49.235.127
70.240.57.253 210.113.40.84 189.86.77.216 91.149.236.232
182.154.110.79 169.105.116.33 142.109.91.123 130.204.162.16