Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Germany

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.245.98.245
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 22855
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.245.98.245.			IN	A

;; AUTHORITY SECTION:
.			563	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2020022100 1800 900 604800 86400

;; Query time: 64 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 21:51:40 CST 2020
;; MSG SIZE  rcvd: 116
Host info
245.98.245.2.in-addr.arpa domain name pointer x2f562f5.dyn.telefonica.de.
Nslookup info:
Server:		100.100.2.138
Address:	100.100.2.138#53

Non-authoritative answer:
245.98.245.2.in-addr.arpa	name = x2f562f5.dyn.telefonica.de.

Authoritative answers can be found from:

Related IP info:
Related comments:
IP Type Details Datetime
188.254.0.183 attackspambots
Oct 13 14:37:56 anodpoucpklekan sshd[49110]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=188.254.0.183  user=root
Oct 13 14:37:58 anodpoucpklekan sshd[49110]: Failed password for root from 188.254.0.183 port 37692 ssh2
...
2019-10-13 23:10:58
106.13.81.242 attackbotsspam
Oct 13 04:39:38 hanapaa sshd\[9363\]: Invalid user Toulouse@123 from 106.13.81.242
Oct 13 04:39:38 hanapaa sshd\[9363\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.242
Oct 13 04:39:40 hanapaa sshd\[9363\]: Failed password for invalid user Toulouse@123 from 106.13.81.242 port 48766 ssh2
Oct 13 04:46:23 hanapaa sshd\[9889\]: Invalid user Bizz@2017 from 106.13.81.242
Oct 13 04:46:23 hanapaa sshd\[9889\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.13.81.242
2019-10-13 23:16:08
79.190.48.166 attackspam
Oct 13 02:07:44 home sshd[9401]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.190.48.166  user=root
Oct 13 02:07:46 home sshd[9401]: Failed password for root from 79.190.48.166 port 53366 ssh2
Oct 13 02:40:45 home sshd[9788]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.190.48.166  user=root
Oct 13 02:40:47 home sshd[9788]: Failed password for root from 79.190.48.166 port 46774 ssh2
Oct 13 03:08:28 home sshd[10178]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.190.48.166  user=root
Oct 13 03:08:30 home sshd[10178]: Failed password for root from 79.190.48.166 port 50558 ssh2
Oct 13 03:35:59 home sshd[10455]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=79.190.48.166  user=root
Oct 13 03:36:01 home sshd[10455]: Failed password for root from 79.190.48.166 port 54338 ssh2
Oct 13 04:03:22 home sshd[10722]: pam_unix(sshd:auth): authentic
2019-10-13 23:22:48
114.67.76.63 attackbots
Oct 13 22:11:14 webhost01 sshd[8930]: Failed password for root from 114.67.76.63 port 53584 ssh2
...
2019-10-13 23:26:41
1.170.91.139 attack
IP Ban Report : https://help-dysk.pl/wordpress-firewall-plugins/ip/1.170.91.139/ 
 TW - 1H : (132)  
 Protection Against DDoS WordPress plugin :  
 "odzyskiwanie danych help-dysk" 
 IP Address Ranges by Country : TW 
 NAME ASN : ASN3462 
 
 IP : 1.170.91.139 
 
 CIDR : 1.170.0.0/16 
 
 PREFIX COUNT : 390 
 
 UNIQUE IP COUNT : 12267520 
 
 
 WYKRYTE ATAKI Z ASN3462 :  
  1H - 5 
  3H - 18 
  6H - 31 
 12H - 65 
 24H - 128 
 
 DateTime : 2019-10-13 13:52:17 
 
 INFO : Port Scan TELNET Detected and Blocked by ADMIN  - data recovery
2019-10-13 23:21:47
49.88.112.115 attack
Oct 13 04:42:01 kapalua sshd\[19921\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Oct 13 04:42:03 kapalua sshd\[19921\]: Failed password for root from 49.88.112.115 port 19862 ssh2
Oct 13 04:42:55 kapalua sshd\[20013\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=49.88.112.115  user=root
Oct 13 04:42:57 kapalua sshd\[20013\]: Failed password for root from 49.88.112.115 port 51450 ssh2
Oct 13 04:43:00 kapalua sshd\[20013\]: Failed password for root from 49.88.112.115 port 51450 ssh2
2019-10-13 22:49:34
101.95.29.150 attackspambots
Oct 13 16:57:03 MainVPS sshd[30905]: Invalid user 123 from 101.95.29.150 port 43509
Oct 13 16:57:03 MainVPS sshd[30905]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=101.95.29.150
Oct 13 16:57:03 MainVPS sshd[30905]: Invalid user 123 from 101.95.29.150 port 43509
Oct 13 16:57:05 MainVPS sshd[30905]: Failed password for invalid user 123 from 101.95.29.150 port 43509 ssh2
Oct 13 17:02:13 MainVPS sshd[31283]: Invalid user Pa55w0rd2018 from 101.95.29.150 port 63396
...
2019-10-13 23:14:43
222.186.15.110 attackspambots
Oct 13 16:55:43 localhost sshd\[20517\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.15.110  user=root
Oct 13 16:55:45 localhost sshd\[20517\]: Failed password for root from 222.186.15.110 port 26703 ssh2
Oct 13 16:55:47 localhost sshd\[20517\]: Failed password for root from 222.186.15.110 port 26703 ssh2
2019-10-13 23:02:24
103.211.21.94 attackspambots
Unauthorised access (Oct 13) SRC=103.211.21.94 LEN=48 TTL=114 ID=2766 DF TCP DPT=445 WINDOW=8192 SYN
2019-10-13 23:12:42
149.56.89.123 attack
Oct 13 16:12:54 tux-35-217 sshd\[21808\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.89.123  user=root
Oct 13 16:12:56 tux-35-217 sshd\[21808\]: Failed password for root from 149.56.89.123 port 43408 ssh2
Oct 13 16:22:14 tux-35-217 sshd\[21873\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=149.56.89.123  user=root
Oct 13 16:22:16 tux-35-217 sshd\[21873\]: Failed password for root from 149.56.89.123 port 35350 ssh2
...
2019-10-13 23:01:03
64.58.126.236 attackbots
attempted to install a trojan 7:42 on 10/13/2019
2019-10-13 22:48:33
182.72.178.114 attackbots
Oct 13 04:30:18 hpm sshd\[2532\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.178.114  user=root
Oct 13 04:30:21 hpm sshd\[2532\]: Failed password for root from 182.72.178.114 port 47800 ssh2
Oct 13 04:34:29 hpm sshd\[2837\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.178.114  user=root
Oct 13 04:34:31 hpm sshd\[2837\]: Failed password for root from 182.72.178.114 port 2170 ssh2
Oct 13 04:38:50 hpm sshd\[3179\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=182.72.178.114  user=root
2019-10-13 22:58:49
61.132.87.136 attack
Fail2Ban - HTTP Exploit Attempt
2019-10-13 22:58:30
171.6.81.56 attackspambots
Lines containing failures of 171.6.81.56
Oct 12 04:35:51 shared12 sshd[19172]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.6.81.56  user=r.r
Oct 12 04:35:53 shared12 sshd[19172]: Failed password for r.r from 171.6.81.56 port 5232 ssh2
Oct 12 04:35:53 shared12 sshd[19172]: Received disconnect from 171.6.81.56 port 5232:11: Bye Bye [preauth]
Oct 12 04:35:53 shared12 sshd[19172]: Disconnected from authenticating user r.r 171.6.81.56 port 5232 [preauth]
Oct 12 04:50:37 shared12 sshd[23920]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=171.6.81.56  user=r.r
Oct 12 04:50:39 shared12 sshd[23920]: Failed password for r.r from 171.6.81.56 port 4716 ssh2
Oct 12 04:50:40 shared12 sshd[23920]: Received disconnect from 171.6.81.56 port 4716:11: Bye Bye [preauth]
Oct 12 04:50:40 shared12 sshd[23920]: Disconnected from authenticating user r.r 171.6.81.56 port 4716 [preauth]
Oct 12 04:55:04 shared........
------------------------------
2019-10-13 23:09:54
188.171.40.60 attack
2019-10-13T14:35:35.519228abusebot-5.cloudsearch.cf sshd\[7400\]: Invalid user P@ssw0rd!@\# from 188.171.40.60 port 47232
2019-10-13 22:55:12

Recently Reported IPs

40.90.22.183 62.173.151.172 167.172.255.214 188.138.247.45
128.0.12.132 14.186.56.217 27.77.231.76 121.122.106.221
61.132.102.51 14.146.95.239 220.168.22.139 60.251.136.127
106.202.14.227 119.115.56.103 58.216.216.75 31.200.99.98
1.42.25.185 200.48.31.169 92.146.188.143 13.90.81.73