Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Turin

Region: Piedmont

Country: Italy

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 213.45.237.149
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 20035
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;213.45.237.149.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025021301 1800 900 604800 86400

;; Query time: 15 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 14 03:25:56 CST 2025
;; MSG SIZE  rcvd: 107
Host info
149.237.45.213.in-addr.arpa domain name pointer host-213-45-237-149.retail.telecomitalia.it.
149.237.45.213.in-addr.arpa domain name pointer host-213-45-237-149.pool21345.interbusiness.it.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
149.237.45.213.in-addr.arpa	name = host-213-45-237-149.pool21345.interbusiness.it.
149.237.45.213.in-addr.arpa	name = host-213-45-237-149.retail.telecomitalia.it.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
163.172.184.172 attackspambots
...
2020-09-29 21:03:42
185.136.52.158 attackbotsspam
Sep 29 06:24:45 rocket sshd[27824]: Failed password for root from 185.136.52.158 port 53426 ssh2
Sep 29 06:31:00 rocket sshd[28881]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=185.136.52.158
...
2020-09-29 21:12:40
23.101.156.218 attackspambots
Sep 29 08:15:42 pornomens sshd\[16394\]: Invalid user wms from 23.101.156.218 port 32862
Sep 29 08:15:42 pornomens sshd\[16394\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=23.101.156.218
Sep 29 08:15:43 pornomens sshd\[16394\]: Failed password for invalid user wms from 23.101.156.218 port 32862 ssh2
...
2020-09-29 21:04:30
31.215.200.164 attackspambots
firewall-block, port(s): 445/tcp
2020-09-29 21:14:29
117.58.241.69 attackspambots
Sep 29 07:01:11 ns381471 sshd[14216]: Failed password for backup from 117.58.241.69 port 33966 ssh2
Sep 29 07:05:31 ns381471 sshd[15209]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=117.58.241.69
2020-09-29 20:56:25
61.96.244.193 attackbotsspam
Portscan detected
2020-09-29 20:55:29
121.123.148.220 attack
" "
2020-09-29 21:00:34
58.64.215.150 attack
2020-09-29T05:08:14.376157suse-nuc sshd[5216]: User root from 58.64.215.150 not allowed because listed in DenyUsers
...
2020-09-29 21:06:16
62.234.130.87 attackbots
20 attempts against mh-ssh on echoip
2020-09-29 20:58:10
111.229.1.180 attackbotsspam
(sshd) Failed SSH login from 111.229.1.180 (CN/China/-): 5 in the last 3600 secs
2020-09-29 20:53:09
106.13.8.46 attackbotsspam
Invalid user deploy from 106.13.8.46 port 56034
2020-09-29 20:57:50
125.43.18.132 attack
Port Scan detected!
...
2020-09-29 21:00:19
202.153.37.194 attackbots
Sep 29 14:42:31 *hidden* sshd[44604]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=202.153.37.194 Sep 29 14:42:33 *hidden* sshd[44604]: Failed password for invalid user tphan from 202.153.37.194 port 62480 ssh2 Sep 29 14:47:21 *hidden* sshd[45509]: Invalid user oracle from 202.153.37.194 port 27151
2020-09-29 21:11:41
192.35.168.224 attackbotsspam
[N3.H3.VM3] Port Scanner Detected Blocked by UFW
2020-09-29 20:55:15
111.72.194.102 attack
Sep 29 00:22:52 srv01 postfix/smtpd\[19604\]: warning: unknown\[111.72.194.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 29 00:33:09 srv01 postfix/smtpd\[19604\]: warning: unknown\[111.72.194.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 29 00:36:35 srv01 postfix/smtpd\[22584\]: warning: unknown\[111.72.194.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 29 00:36:47 srv01 postfix/smtpd\[22584\]: warning: unknown\[111.72.194.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Sep 29 00:37:03 srv01 postfix/smtpd\[22584\]: warning: unknown\[111.72.194.102\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2020-09-29 20:43:53

Recently Reported IPs

120.249.200.164 16.106.35.151 234.127.201.123 44.236.70.127
172.19.175.107 94.235.221.192 177.80.154.181 96.226.21.143
199.107.145.214 87.221.40.90 108.7.200.192 210.111.53.194
46.198.155.150 66.74.189.167 229.39.47.19 246.251.36.69
74.158.1.252 115.49.117.122 177.218.135.103 76.157.32.202