Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: IANA Special-Purpose Address

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.1.22.96
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 7722
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.1.22.96.			IN	A

;; AUTHORITY SECTION:
.			30	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2025022001 1800 900 604800 86400

;; Query time: 10 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Feb 21 06:59:50 CST 2025
;; MSG SIZE  rcvd: 104
Host info
Host 96.22.1.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 96.22.1.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
106.12.27.130 attackbots
(sshd) Failed SSH login from 106.12.27.130 (CN/China/-): 3 in the last 3600 secs; Ports: *; Direction: inout; Trigger: LF_SSHD; Logs: Dec 29 22:43:46 andromeda sshd[9790]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.130  user=root
Dec 29 22:43:48 andromeda sshd[9790]: Failed password for root from 106.12.27.130 port 60160 ssh2
Dec 29 23:03:06 andromeda sshd[12056]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=106.12.27.130  user=root
2019-12-30 08:17:11
105.157.115.241 attackspam
Automatic report - Port Scan Attack
2019-12-30 08:03:41
93.90.75.211 attackspambots
Dec 28 19:05:28 ns01 sshd[9169]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.90.75.211  user=r.r
Dec 28 19:05:30 ns01 sshd[9169]: Failed password for r.r from 93.90.75.211 port 54400 ssh2
Dec 28 19:10:27 ns01 sshd[9318]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=93.90.75.211  user=r.r
Dec 28 19:10:29 ns01 sshd[9318]: Failed password for r.r from 93.90.75.211 port 49474 ssh2
Dec 28 19:10:36 ns01 sshd[9320]: Invalid user susi from 93.90.75.211

........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=93.90.75.211
2019-12-30 07:40:16
222.186.190.92 attackbotsspam
pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=222.186.190.92  user=root
Failed password for root from 222.186.190.92 port 9364 ssh2
Failed password for root from 222.186.190.92 port 9364 ssh2
Failed password for root from 222.186.190.92 port 9364 ssh2
Failed password for root from 222.186.190.92 port 9364 ssh2
2019-12-30 08:13:52
92.13.185.169 attackbots
Automatic report - Port Scan Attack
2019-12-30 08:12:31
190.15.210.224 attackbots
[Aegis] @ 2019-12-30 00:19:12  0000 -> Attempted Administrator Privilege Gain: ET SCAN LibSSH Based Frequent SSH Connections Likely BruteForce Attack
2019-12-30 07:42:35
218.92.0.164 attack
--- report ---
Dec 29 20:39:51 -0300 sshd: Connection from 218.92.0.164 port 58176
Dec 29 20:39:54 -0300 sshd: Failed password for root from 218.92.0.164 port 58176 ssh2
Dec 29 20:39:55 -0300 sshd: Received disconnect from 218.92.0.164: 11:  [preauth]
2019-12-30 07:46:03
192.42.116.14 attackspam
michaelklotzbier.de:80 192.42.116.14 - - [30/Dec/2019:00:03:29 +0100] "POST /xmlrpc.php HTTP/1.0" 301 505 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36"
michaelklotzbier.de 192.42.116.14 [30/Dec/2019:00:03:29 +0100] "POST /xmlrpc.php HTTP/1.0" 200 3595 "-" "Mozilla/5.0 (X11; Linux x86_64) AppleWebKit/537.36 (KHTML, like Gecko) Chrome/69.0.3497.81 Safari/537.36"
2019-12-30 08:02:45
125.105.145.132 attackbotsspam
Unauthorized connection attempt detected from IP address 125.105.145.132 to port 23
2019-12-30 08:19:28
114.80.210.83 attackspambots
firewall-block, port(s): 1433/tcp
2019-12-30 07:43:19
78.128.113.172 attackspambots
SASL PLAIN auth failed: ruser=...
2019-12-30 08:06:44
222.186.180.147 attackbots
2019-12-29T23:44:40.289351+00:00 suse sshd[24433]: User root from 222.186.180.147 not allowed because not listed in AllowUsers
2019-12-29T23:44:43.016144+00:00 suse sshd[24433]: error: PAM: Authentication failure for illegal user root from 222.186.180.147
2019-12-29T23:44:40.289351+00:00 suse sshd[24433]: User root from 222.186.180.147 not allowed because not listed in AllowUsers
2019-12-29T23:44:43.016144+00:00 suse sshd[24433]: error: PAM: Authentication failure for illegal user root from 222.186.180.147
2019-12-29T23:44:40.289351+00:00 suse sshd[24433]: User root from 222.186.180.147 not allowed because not listed in AllowUsers
2019-12-29T23:44:43.016144+00:00 suse sshd[24433]: error: PAM: Authentication failure for illegal user root from 222.186.180.147
2019-12-29T23:44:43.018380+00:00 suse sshd[24433]: Failed keyboard-interactive/pam for invalid user root from 222.186.180.147 port 65186 ssh2
...
2019-12-30 07:48:08
211.151.95.139 attack
5x Failed Password
2019-12-30 07:57:16
46.101.149.241 attackbotsspam
SS5,WP GET /wp-login.php
2019-12-30 07:41:07
92.118.13.41 attackspambots
Forbidden directory scan :: 2019/12/29 23:04:02 [error] 1031#1031: *119556 access forbidden by rule, client: 92.118.13.41, server: [censored_1], request: "GET /blog/do-not-delete... HTTP/1.1", host: "www.[censored_1]"
2019-12-30 07:42:49

Recently Reported IPs

186.202.114.65 165.225.194.133 185.50.244.112 227.151.74.28
250.218.46.93 236.92.110.166 208.223.243.220 67.251.24.246
174.135.68.160 207.0.139.129 220.225.38.77 143.45.142.58
140.87.73.171 124.118.159.198 59.50.124.202 163.64.46.105
61.29.206.14 147.94.14.52 79.117.206.64 187.242.171.93