Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: Brisbane

Region: Queensland

Country: Australia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 220.245.112.28
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 40267
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;220.245.112.28.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2024120602 1800 900 604800 86400

;; Query time: 16 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Sat Dec 07 13:16:47 CST 2024
;; MSG SIZE  rcvd: 107
Host info
28.112.245.220.in-addr.arpa domain name pointer 220-245-112-28.tgpi.com.au.
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

Non-authoritative answer:
28.112.245.220.in-addr.arpa	name = 220-245-112-28.tgpi.com.au.

Authoritative answers can be found from:
Related IP info:
Related comments:
IP Type Details Datetime
46.201.245.101 attackbotsspam
Unauthorized connection attempt from IP address 46.201.245.101 on Port 445(SMB)
2019-11-19 23:58:41
46.38.144.17 attackbots
Nov 19 16:43:52 relay postfix/smtpd\[18760\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 19 16:44:09 relay postfix/smtpd\[12488\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 19 16:44:29 relay postfix/smtpd\[15853\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 19 16:44:47 relay postfix/smtpd\[12432\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
Nov 19 16:45:06 relay postfix/smtpd\[15853\]: warning: unknown\[46.38.144.17\]: SASL LOGIN authentication failed: UGFzc3dvcmQ6
...
2019-11-20 00:03:08
201.48.4.15 attackbotsspam
5x Failed Password
2019-11-20 00:32:13
216.243.31.2 attackbotsspam
216.243.31.2 was recorded 23 times by 22 hosts attempting to connect to the following ports: 80,443. Incident counter (4h, 24h, all-time): 23, 53, 515
2019-11-20 00:31:43
85.236.25.18 attack
postfix (unknown user, SPF fail or relay access denied)
2019-11-19 23:53:37
183.82.130.22 attackbotsspam
Unauthorized connection attempt from IP address 183.82.130.22 on Port 445(SMB)
2019-11-20 00:00:17
45.118.32.149 attackspambots
Unauthorized connection attempt from IP address 45.118.32.149 on Port 445(SMB)
2019-11-20 00:21:31
185.176.27.246 attackspam
Excessive Port-Scanning
2019-11-19 23:58:08
37.195.105.57 attack
Automatic report - Banned IP Access
2019-11-20 00:30:03
61.96.29.55 attackspambots
Unauthorized connection attempt from IP address 61.96.29.55 on Port 445(SMB)
2019-11-19 23:59:45
140.143.22.200 attack
2019-11-19T15:43:51.085094shield sshd\[5491\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.22.200  user=root
2019-11-19T15:43:53.255892shield sshd\[5491\]: Failed password for root from 140.143.22.200 port 34242 ssh2
2019-11-19T15:49:56.558316shield sshd\[6838\]: Invalid user bergsvendsen from 140.143.22.200 port 40912
2019-11-19T15:49:56.563263shield sshd\[6838\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=140.143.22.200
2019-11-19T15:49:58.507445shield sshd\[6838\]: Failed password for invalid user bergsvendsen from 140.143.22.200 port 40912 ssh2
2019-11-19 23:52:35
41.39.89.240 attack
Unauthorized connection attempt from IP address 41.39.89.240 on Port 445(SMB)
2019-11-20 00:16:18
106.12.42.95 attack
Nov 19 14:01:41 v22018086721571380 sshd[11866]: Failed password for invalid user admin from 106.12.42.95 port 39782 ssh2
2019-11-20 00:24:55
201.39.188.122 attack
Unauthorized connection attempt from IP address 201.39.188.122 on Port 445(SMB)
2019-11-20 00:02:28
115.135.230.4 attackbotsspam
Portscan or hack attempt detected by psad/fwsnort
2019-11-20 00:37:24

Recently Reported IPs

203.155.255.39 255.77.36.90 119.98.225.176 43.195.44.69
229.142.79.58 180.184.55.16 211.241.129.202 20.246.125.1
169.103.162.57 35.170.11.232 220.5.249.51 170.53.103.87
170.146.231.193 96.35.59.5 239.36.54.236 59.225.126.172
91.64.69.240 53.30.157.200 250.95.187.46 55.7.112.217