Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Indonesia

Internet Service Provider: PT Telkom Indonesia

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbots
Triggered: repeated knocking on closed ports.
2020-03-11 15:10:52
Comments on same subnet:
IP Type Details Datetime
180.245.131.142 attackspambots
Unauthorized connection attempt from IP address 180.245.131.142 on Port 445(SMB)
2020-06-19 06:56:00
180.245.133.133 attackbots
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-09-21 02:46:55,909 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.245.133.133)
2019-09-21 17:57:41
180.245.132.114 attack
@LucianNitescu Personal Honeypot Network <<<>>> Donate at paypal.me/LNitescu <<<>>> 2019-06-29 17:31:45,858 INFO [amun_request_handler] PortScan Detected on Port: 445 (180.245.132.114)
2019-06-30 09:51:36
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 180.245.13.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 33414
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;180.245.13.245.			IN	A

;; AUTHORITY SECTION:
.			525	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020031100 1800 900 604800 86400

;; Query time: 174 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Wed Mar 11 15:10:47 CST 2020
;; MSG SIZE  rcvd: 118
Host info
245.13.245.180.in-addr.arpa has no PTR record
Nslookup info:
;; Got SERVFAIL reply from 183.60.83.19, trying next server
Server:		183.60.82.98
Address:	183.60.82.98#53

** server can't find 245.13.245.180.in-addr.arpa: SERVFAIL
Related IP info:
Related comments:
IP Type Details Datetime
177.152.66.14 attack
unauthorized connection attempt
2020-02-19 16:49:51
122.100.110.121 attack
unauthorized connection attempt
2020-02-19 16:35:39
187.108.236.43 attack
unauthorized connection attempt
2020-02-19 16:46:53
1.1.111.99 attackspambots
unauthorized connection attempt
2020-02-19 16:32:42
190.211.29.193 attackbots
unauthorized connection attempt
2020-02-19 16:26:58
171.246.121.227 attackbots
unauthorized connection attempt
2020-02-19 16:42:32
114.33.19.32 attack
unauthorized connection attempt
2020-02-19 16:37:06
117.0.102.111 attackbots
Unauthorised access (Feb 19) SRC=117.0.102.111 LEN=40 TTL=42 ID=42427 TCP DPT=23 WINDOW=36381 SYN
2020-02-19 16:50:44
178.94.22.86 attackbots
unauthorized connection attempt
2020-02-19 16:57:04
178.205.106.188 attackbots
unauthorized connection attempt
2020-02-19 16:41:27
80.83.26.130 attackspam
unauthorized connection attempt
2020-02-19 16:53:54
180.179.207.69 attack
unauthorized connection attempt
2020-02-19 17:06:16
185.173.35.21 attackspambots
Port 6002 scan denied
2020-02-19 16:25:09
113.4.224.49 attackspambots
unauthorized connection attempt
2020-02-19 16:29:28
36.77.92.35 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-02-19 16:38:50

Recently Reported IPs

171.250.82.245 117.23.170.9 110.78.36.130 183.81.120.78
103.236.193.58 27.34.104.51 187.33.233.230 103.133.114.14
159.146.38.203 199.209.96.66 193.93.194.139 178.146.97.42
131.86.73.130 178.138.37.81 43.81.205.169 113.163.50.214
89.1.165.162 113.162.174.216 224.130.47.70 14.138.173.143