Must be a valid IPv4 or IPv6 ip address, e.g. 127.0.0.1 or 2001:DB8:0:0:8:800:200C:417A
Basic Info

City: unknown

Region: unknown

Country: Latvia

Internet Service Provider: unknown

Hostname: unknown

Organization: unknown

Usage Type: unknown

Comments:
No discussion about this IP yet. Click above link to make one.
Comments on same subnet:
No discussion about this subnet yet..
Whois info:
b
Dig info:
; <<>> DiG 9.10.3-P4-Ubuntu <<>> 45.12.129.67
;; global options: +cmd
;; Got answer:
;; ->>HEADER<<- opcode: QUERY, status: NXDOMAIN, id: 60992
;; flags: qr rd ra; QUERY: 1, ANSWER: 0, AUTHORITY: 1, ADDITIONAL: 0

;; QUESTION SECTION:
;45.12.129.67.			IN	A

;; AUTHORITY SECTION:
.			345	IN	SOA	a.root-servers.net. nstld.verisign-grs.com. 2022100700 1800 900 604800 86400

;; Query time: 65 msec
;; SERVER: 183.60.83.19#53(183.60.83.19)
;; WHEN: Fri Oct 07 22:21:58 CST 2022
;; MSG SIZE  rcvd: 105
Host info
Host 67.129.12.45.in-addr.arpa. not found: 3(NXDOMAIN)
Nslookup info:
Server:		183.60.83.19
Address:	183.60.83.19#53

** server can't find 67.129.12.45.in-addr.arpa: NXDOMAIN
Related IP info:
Related comments:
IP Type Details Datetime
151.106.61.15 attackspam
[portscan] Port scan
2019-11-20 03:30:56
156.197.4.240 attackspambots
Invalid user admin from 156.197.4.240 port 60580
2019-11-20 03:30:23
37.114.153.232 attackbotsspam
Invalid user admin from 37.114.153.232 port 51551
2019-11-20 03:17:40
111.231.239.143 attackspambots
Invalid user koukyou from 111.231.239.143 port 37664
2019-11-20 03:06:56
218.219.246.124 attackbotsspam
2019-11-19T19:45:12.160386struts4.enskede.local sshd\[31482\]: Invalid user test from 218.219.246.124 port 40594
2019-11-19T19:45:12.169893struts4.enskede.local sshd\[31482\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=l246124.ppp.asahi-net.or.jp
2019-11-19T19:45:14.859091struts4.enskede.local sshd\[31482\]: Failed password for invalid user test from 218.219.246.124 port 40594 ssh2
2019-11-19T19:48:43.273188struts4.enskede.local sshd\[31485\]: pam_unix\(sshd:auth\): authentication failure\; logname= uid=0 euid=0 tty=ssh ruser= rhost=l246124.ppp.asahi-net.or.jp  user=root
2019-11-19T19:48:46.641997struts4.enskede.local sshd\[31485\]: Failed password for root from 218.219.246.124 port 60480 ssh2
...
2019-11-20 02:55:44
58.214.255.41 attackspambots
SSH bruteforce (Triggered fail2ban)
2019-11-20 03:14:26
14.215.46.94 attackbots
2019-11-19T18:18:02.375487abusebot-5.cloudsearch.cf sshd\[31997\]: Invalid user bjorn from 14.215.46.94 port 19685
2019-11-20 03:18:32
157.230.209.220 attackbots
Invalid user slenters from 157.230.209.220 port 50506
2019-11-20 03:29:33
119.196.83.26 attackbots
Nov 19 19:38:56 XXX sshd[40503]: Invalid user ofsaa from 119.196.83.26 port 57842
2019-11-20 03:04:40
168.181.104.30 attackbotsspam
Nov 19 17:58:16 cavern sshd[6569]: pam_unix(sshd:auth): authentication failure; logname= uid=0 euid=0 tty=ssh ruser= rhost=168.181.104.30
2019-11-20 03:00:07
179.85.153.153 attackbotsspam
Invalid user admin from 179.85.153.153 port 1739
2019-11-20 02:59:14
147.50.3.30 attackspam
Invalid user francheski from 147.50.3.30 port 52345
2019-11-20 03:03:00
156.213.2.73 attackbots
Invalid user admin from 156.213.2.73 port 56864
2019-11-20 03:30:03
95.70.101.60 attackbots
Brute force SMTP login attempts.
2019-11-20 03:11:39
165.22.182.168 attack
fraudulent SSH attempt
2019-11-20 03:29:17

Recently Reported IPs

43.251.165.143 180.119.68.225 27.23.64.61 138.128.69.189
8.26.182.45 5.183.35.1 180.115.207.28 104.248.118.216
20.219.22.116 180.125.64.179 43.226.152.75 5.252.140.88
85.239.59.78 79.225.78.2 139.59.122.183 103.8.238.78
103.27.225.90 223.8.2.159 43.204.148.192 137.184.217.120