Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: None

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 245.149.111.12
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 28377
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;245.149.111.12.			IN	A

;; AUTHORITY SECTION:
.			339	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022110701 1800 900 604800 86400

;; Query time: 67 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Tue Nov 08 17:44:14 CST 2022
;; MSG SIZE  rcvd: 107
Host info
Host 12.111.149.245.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 12.111.149.245.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
193.70.8.163 attackspambots
Aug  1 05:15:19 localhost sshd\[5832\]: Invalid user dacc from 193.70.8.163
Aug  1 05:15:19 localhost sshd\[5832\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.8.163
Aug  1 05:15:21 localhost sshd\[5832\]: Failed password for invalid user dacc from 193.70.8.163 port 44492 ssh2
Aug  1 05:19:27 localhost sshd\[5887\]: Invalid user hemant from 193.70.8.163
Aug  1 05:19:27 localhost sshd\[5887\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=193.70.8.163
...
2019-08-01 20:50:22
68.41.23.123 attack
Jun 13 05:37:30 ubuntu sshd[25918]: Failed password for root from 68.41.23.123 port 44158 ssh2
Jun 13 05:41:25 ubuntu sshd[26259]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=68.41.23.123
Jun 13 05:41:27 ubuntu sshd[26259]: Failed password for invalid user dirmngr from 68.41.23.123 port 38458 ssh2
2019-08-01 21:23:08
186.251.211.6 attackbotsspam
libpam_shield report: forced login attempt
2019-08-01 20:50:50
200.110.174.137 attackspambots
Aug  1 12:21:18 MK-Soft-VM6 sshd\[7697\]: Invalid user teste123456 from 200.110.174.137 port 41240
Aug  1 12:21:18 MK-Soft-VM6 sshd\[7697\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=200.110.174.137
Aug  1 12:21:19 MK-Soft-VM6 sshd\[7697\]: Failed password for invalid user teste123456 from 200.110.174.137 port 41240 ssh2
...
2019-08-01 20:36:24
185.176.27.14 attackspam
MultiHost/MultiPort Probe, Scan, Hack -
2019-08-01 20:43:52
46.25.32.133 attack
Aug  1 06:27:25 debian sshd\[25212\]: Invalid user test2 from 46.25.32.133 port 36906
Aug  1 06:27:25 debian sshd\[25212\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=46.25.32.133
Aug  1 06:27:27 debian sshd\[25212\]: Failed password for invalid user test2 from 46.25.32.133 port 36906 ssh2
...
2019-08-01 20:54:38
149.56.20.183 attackbots
Invalid user alveos from 149.56.20.183 port 58180
2019-08-01 20:45:43
180.126.239.159 attackspam
port scan and connect, tcp 22 (ssh)
2019-08-01 21:09:51
106.13.135.165 attackspambots
Aug  1 09:25:29 xb3 sshd[14595]: Failed password for invalid user report from 106.13.135.165 port 54418 ssh2
Aug  1 09:25:29 xb3 sshd[14595]: Received disconnect from 106.13.135.165: 11: Bye Bye [preauth]
Aug  1 09:44:31 xb3 sshd[26206]: Failed password for invalid user cathyreis from 106.13.135.165 port 53704 ssh2
Aug  1 09:44:31 xb3 sshd[26206]: Received disconnect from 106.13.135.165: 11: Bye Bye [preauth]
Aug  1 09:47:51 xb3 sshd[20282]: Failed password for invalid user ts from 106.13.135.165 port 52136 ssh2
Aug  1 09:47:51 xb3 sshd[20282]: Received disconnect from 106.13.135.165: 11: Bye Bye [preauth]
Aug  1 09:51:04 xb3 sshd[16823]: Failed password for invalid user postgres from 106.13.135.165 port 50462 ssh2
Aug  1 09:51:04 xb3 sshd[16823]: Received disconnect from 106.13.135.165: 11: Bye Bye [preauth]


........
-----------------------------------------------
https://www.blocklist.de/en/view.html?ip=106.13.135.165
2019-08-01 20:27:09
74.211.48.94 attackbots
Aug  1 00:49:41 aat-srv002 sshd[32025]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.211.48.94
Aug  1 00:49:42 aat-srv002 sshd[32025]: Failed password for invalid user pi from 74.211.48.94 port 52062 ssh2
Aug  1 00:49:57 aat-srv002 sshd[32048]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=74.211.48.94
Aug  1 00:49:58 aat-srv002 sshd[32048]: Failed password for invalid user pi from 74.211.48.94 port 32952 ssh2
...
2019-08-01 21:14:35
129.204.219.180 attackspam
Automatic report - Banned IP Access
2019-08-01 20:57:44
209.17.96.194 attackbots
Automatic report - Banned IP Access
2019-08-01 20:33:27
123.160.220.36 attack
Aug  1 05:19:58 mail kernel: \[1890838.484982\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=123.160.220.36 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=3880 DF PROTO=TCP SPT=58675 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug  1 05:20:01 mail kernel: \[1890841.573183\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=123.160.220.36 DST=91.205.173.180 LEN=52 TOS=0x00 PREC=0x00 TTL=113 ID=9006 DF PROTO=TCP SPT=58675 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0 
Aug  1 05:20:07 mail kernel: \[1890847.578966\] \[UFW BLOCK\] IN=eth0 OUT= MAC=00:50:56:3d:86:ee:00:08:e3:ff:fd:90:08:00 SRC=123.160.220.36 DST=91.205.173.180 LEN=48 TOS=0x00 PREC=0x00 TTL=113 ID=13437 DF PROTO=TCP SPT=58675 DPT=65353 WINDOW=8192 RES=0x00 SYN URGP=0
2019-08-01 20:25:03
194.177.207.16 attackbotsspam
20 attempts against mh-ssh on plane.magehost.pro
2019-08-01 20:55:51
188.131.154.248 attackspam
Invalid user servercsgo from 188.131.154.248 port 35048
2019-08-01 21:09:29

Recently Reported IPs

208.243.154.231 205.213.175.131 44.77.241.126 151.242.46.7
71.168.147.195 208.56.215.13 174.96.205.59 24.172.174.86
24.95.1.57 219.82.166.109 64.26.28.50 69.89.137.119
39.65.90.135 136.255.79.116 88.204.151.112 195.254.56.78
200.235.170.245 195.252.30.69 171.174.124.128 177.18.190.103