Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Italy

Internet Service Provider: Vodafone Italia S.p.A.

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
Type Details Datetime
attackbotsspam
Automatic report - Banned IP Access
2020-03-28 08:55:44
attackbots
firewall-block, port(s): 34567/tcp
2019-10-06 03:21:49
attack
81/tcp
[2019-09-30]1pkt
2019-09-30 13:44:01
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 2.45.112.239
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 13915
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 1

;; OPT PSEUDOSECTION:
; EDNS: version: 0, flags:; udp: 4096
;; QUESTION SECTION:
;2.45.112.239.			IN	A

;; AUTHORITY SECTION:
.			550	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2019093000 1800 900 604800 86400

;; Query time: 85 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Mon Sep 30 13:43:58 CST 2019
;; MSG SIZE  rcvd: 116
Host info
239.112.45.2.in-addr.arpa domain name pointer net-2-45-112-239.cust.vodafonedsl.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
239.112.45.2.in-addr.arpa	name = net-2-45-112-239.cust.vodafonedsl.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
77.91.195.251 attackbots
Unauthorized connection attempt from IP address 77.91.195.251 on Port 445(SMB)
2020-10-10 00:40:23
141.98.81.141 attackspam
Cowrie Honeypot: Unauthorised SSH/Telnet login attempt with user "user" at 2020-10-09T16:35:32Z
2020-10-10 00:51:05
2001:41d0:a:1229::1 attackbots
...
2020-10-10 00:16:07
64.71.32.85 attackbots
C1,WP GET /nelson/portal/wp-includes/wlwmanifest.xml
2020-10-10 00:31:12
187.190.40.112 attackbotsspam
2020-10-09T23:08:16.460945billing sshd[21487]: Failed password for root from 187.190.40.112 port 24337 ssh2
2020-10-09T23:11:56.163922billing sshd[29880]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=fixed-187-190-40-112.totalplay.net  user=root
2020-10-09T23:11:57.942981billing sshd[29880]: Failed password for root from 187.190.40.112 port 29814 ssh2
...
2020-10-10 00:30:13
64.20.51.155 attackbots
Telnet/23 MH Probe, Scan, BF, Hack -
2020-10-10 00:48:01
141.98.9.36 attack
Bruteforce detected by fail2ban
2020-10-10 00:54:57
45.141.84.57 attack
ET CINS Active Threat Intelligence Poor Reputation IP group 27
2020-10-10 00:26:40
1.253.221.152 attack
Port Scan detected!
...
2020-10-10 00:23:44
61.177.172.158 attackspambots
$f2bV_matches
2020-10-10 00:48:37
159.89.194.64 attack
Honeypot hit.
2020-10-10 00:49:02
62.210.114.39 attackbotsspam
Unauthorized connection attempt from IP address 62.210.114.39 on Port 445(SMB)
2020-10-10 00:23:29
167.71.237.73 attackbots
Brute force SMTP login attempted.
...
2020-10-10 00:24:42
106.0.58.136 attack
Web scan/attack: detected 1 distinct attempts within a 12-hour window (GPON (CVE-2018-10561))
2020-10-10 00:19:39
174.217.12.25 attack
Brute forcing email accounts
2020-10-10 00:30:29

Recently Reported IPs

143.114.17.176 37.3.214.92 135.105.98.137 169.50.130.90
219.15.0.6 77.167.62.34 172.187.73.134 187.32.108.242
102.238.219.111 136.197.129.68 78.188.195.220 118.96.137.239
244.156.8.182 188.241.228.204 59.39.137.145 247.171.220.116
178.169.86.2 112.218.140.232 66.101.58.131 221.28.53.79