Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: United States

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
IP Type Details Datetime
198.145.13.100 attackspam
Jul 16 13:23:23 abendstille sshd\[23273\]: Invalid user walter from 198.145.13.100
Jul 16 13:23:23 abendstille sshd\[23273\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.145.13.100
Jul 16 13:23:24 abendstille sshd\[23273\]: Failed password for invalid user walter from 198.145.13.100 port 37320 ssh2
Jul 16 13:29:54 abendstille sshd\[30207\]: Invalid user zihang from 198.145.13.100
Jul 16 13:29:54 abendstille sshd\[30207\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.145.13.100
...
2020-07-16 19:40:33
198.145.13.100 attackbots
Jul 15 22:59:58 rocket sshd[9246]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.145.13.100
Jul 15 23:00:00 rocket sshd[9246]: Failed password for invalid user gaye from 198.145.13.100 port 3596 ssh2
Jul 15 23:07:03 rocket sshd[10439]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.145.13.100
...
2020-07-16 06:21:08
198.145.13.100 attackbots
Jul 12 12:13:33 plex-server sshd[54854]: Invalid user mesic from 198.145.13.100 port 38573
Jul 12 12:13:33 plex-server sshd[54854]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=198.145.13.100 
Jul 12 12:13:33 plex-server sshd[54854]: Invalid user mesic from 198.145.13.100 port 38573
Jul 12 12:13:35 plex-server sshd[54854]: Failed password for invalid user mesic from 198.145.13.100 port 38573 ssh2
Jul 12 12:15:50 plex-server sshd[55171]: Invalid user speech-dispatcher from 198.145.13.100 port 44061
...
2020-07-12 20:26:32
198.145.13.100 attackbotsspam
Jul  7 20:11:39 jumpserver sshd[1563]: Invalid user lucas from 198.145.13.100 port 61875
Jul  7 20:11:41 jumpserver sshd[1563]: Failed password for invalid user lucas from 198.145.13.100 port 61875 ssh2
Jul  7 20:19:07 jumpserver sshd[1656]: Invalid user blaze from 198.145.13.100 port 8016
...
2020-07-08 04:55:32
198.145.13.100 attackbots
(sshd) Failed SSH login from 198.145.13.100 (US/United States/-): 5 in the last 3600 secs
2020-07-06 03:37:20
198.145.13.100 attackspambots
5x Failed Password
2020-06-26 14:12:28
198.145.13.100 attack
no
2020-06-25 23:28:47
198.145.13.100 attack
Invalid user fang from 198.145.13.100 port 43096
2020-06-25 03:11:24
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 198.145.13.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 48900
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;198.145.13.12.			IN	A

;; AUTHORITY SECTION:
.			436	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022021800 1800 900 604800 86400

;; Query time: 17 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 18 22:49:10 CST 2022
;; MSG SIZE  rcvd: 106
Host info
12.13.145.198.in-addr.arpa domain name pointer getclicky.com.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
12.13.145.198.in-addr.arpa	name = getclicky.com.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
45.143.221.35 attackbots
MultiHost/MultiPort Probe, Scan, Hack -
2020-01-27 23:55:40
103.219.43.211 attackspambots
23/tcp
[2020-01-27]1pkt
2020-01-28 00:09:08
164.160.161.90 attackbotsspam
Microsoft SQL Server User Authentication Brute Force Attempt, PTR: PTR record not found
2020-01-28 00:08:55
112.133.229.161 attack
Honeypot attack, port: 445, PTR: PTR record not found
2020-01-27 23:48:35
113.131.125.136 attackspam
Telnet Server BruteForce Attack
2020-01-28 00:04:37
51.77.136.155 attack
Jan 26 22:20:48 serwer sshd\[16056\]: Invalid user sharon from 51.77.136.155 port 56478
Jan 26 22:20:48 serwer sshd\[16056\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.136.155
Jan 26 22:20:50 serwer sshd\[16056\]: Failed password for invalid user sharon from 51.77.136.155 port 56478 ssh2
Jan 26 22:40:29 serwer sshd\[18653\]: Invalid user collin from 51.77.136.155 port 54862
Jan 26 22:40:29 serwer sshd\[18653\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.136.155
Jan 26 22:40:31 serwer sshd\[18653\]: Failed password for invalid user collin from 51.77.136.155 port 54862 ssh2
Jan 26 22:43:00 serwer sshd\[18945\]: Invalid user twintown from 51.77.136.155 port 54604
Jan 26 22:43:00 serwer sshd\[18945\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=51.77.136.155
Jan 26 22:43:02 serwer sshd\[18945\]: Failed password for invalid user twintown
...
2020-01-27 23:44:41
85.172.13.206 attackspam
Unauthorized connection attempt detected from IP address 85.172.13.206 to port 2220 [J]
2020-01-27 23:44:00
198.108.66.203 attack
Honeypot attack, port: 81, PTR: worker-12.sfj.corp.censys.io.
2020-01-27 23:41:19
83.144.110.218 attackbotsspam
Unauthorized connection attempt detected from IP address 83.144.110.218 to port 2220 [J]
2020-01-28 00:20:42
18.219.40.55 attackspambots
Scans 2 times in preceeding hours on the ports (in chronological order) 3000 6000
2020-01-27 23:51:24
185.39.10.124 attackbotsspam
Jan 27 16:12:27 debian-2gb-nbg1-2 kernel: \[2397216.299881\] \[UFW BLOCK\] IN=eth0 OUT= MAC=96:00:00:0e:18:f4:d2:74:7f:6e:37:e3:08:00 SRC=185.39.10.124 DST=195.201.40.59 LEN=40 TOS=0x00 PREC=0x00 TTL=247 ID=26234 PROTO=TCP SPT=51233 DPT=15452 WINDOW=1024 RES=0x00 SYN URGP=0
2020-01-27 23:58:49
218.92.0.138 attackbotsspam
Jan 27 17:04:36 srv01 sshd[26857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Jan 27 17:04:38 srv01 sshd[26857]: Failed password for root from 218.92.0.138 port 36292 ssh2
Jan 27 17:04:41 srv01 sshd[26857]: Failed password for root from 218.92.0.138 port 36292 ssh2
Jan 27 17:04:36 srv01 sshd[26857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Jan 27 17:04:38 srv01 sshd[26857]: Failed password for root from 218.92.0.138 port 36292 ssh2
Jan 27 17:04:41 srv01 sshd[26857]: Failed password for root from 218.92.0.138 port 36292 ssh2
Jan 27 17:04:36 srv01 sshd[26857]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=218.92.0.138  user=root
Jan 27 17:04:38 srv01 sshd[26857]: Failed password for root from 218.92.0.138 port 36292 ssh2
Jan 27 17:04:41 srv01 sshd[26857]: Failed password for root from 218.92.0.138 port 36292 
...
2020-01-28 00:07:15
104.236.2.45 attack
Unauthorized connection attempt detected from IP address 104.236.2.45 to port 2220 [J]
2020-01-27 23:41:46
222.186.180.41 attack
Jan 27 15:53:22 zeus sshd[12726]: Failed password for root from 222.186.180.41 port 56568 ssh2
Jan 27 15:53:26 zeus sshd[12726]: Failed password for root from 222.186.180.41 port 56568 ssh2
Jan 27 15:53:30 zeus sshd[12726]: Failed password for root from 222.186.180.41 port 56568 ssh2
Jan 27 15:53:35 zeus sshd[12726]: Failed password for root from 222.186.180.41 port 56568 ssh2
Jan 27 15:53:39 zeus sshd[12726]: Failed password for root from 222.186.180.41 port 56568 ssh2
2020-01-28 00:18:16
180.254.136.250 attackbots
CloudCIX Reconnaissance Scan Detected, PTR: PTR record not found
2020-01-27 23:50:32

Recently Reported IPs

198.145.13.13 198.145.29.26 198.147.139.112 198.145.21.16
198.144.188.58 198.145.13.14 198.147.22.225 198.147.255.97
198.145.29.80 198.148.127.30 198.148.106.188 198.148.103.4
198.148.77.60 198.148.79.59 198.15.109.149 198.15.106.227
198.15.102.82 198.15.108.202 198.15.109.91 198.15.115.235